Journal title
ISSN:    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 31 Number 1 Year 2020

10 articles in this issue 

Ramia M. Mahmood,Ahmed Sami Hassan

Analysis of the jet stream is diagnostic over Baghdad for period studies 2012 to 2014 using Radiosonde data and synoptic charts. The source of data is Iraq Meteorological Organization and Seismology (IMOS). Similar way for weather forecasts to identify ar... see more

Pags. 1 - 8  

Dalal Subree Bedan

This study aimed to extract urease enzyme from available plant source which was broad beans (Vicia faba L.) using aqueous solution in a ratio1:3(w:v) .The crude extract appeared enzyme activity 33.3 U/ml. Results of this study revealed the possibility to ... see more

Pags. 9 - 14  

Dr.Neihaya Heikmat Zaki

Twenty five samples were collected from the soil around the Tigris River from different locations in Iraqi cities, and 45 bacterial isolates were obtained. Three of these isolates were further tested for their degrading capacity of Bisphenol A (BPA) in Ba... see more

Pags. 15 - 21  

Shahad Bashir,Amal Abdul Salam Al-Habib

This study was conducted in the botanical garden, Department of biology, College of Science/ Mustansiriyah University in from (15 February to 15 March, 2019) under the natural environmental conditions in the greenhouse in order to evaluate the effectivene... see more

Pags. 22 - 30  

nadia azeez betti,Redha Ib. Hussain,Sahar Ab. Kadhem

In this research a number of pyrrolidine-2-one derivatives were prepared by lactamization of ? –butyrolactone (GBL) with hydrazine hydrate (80%) to produce (1-aminopyrrolidine-2-one) that undergoes several reactions to afford these derivatives that diagno... see more

Pags. 31 - 40  

Ansam Sabah Bader,Shaymaa Hameed,Maisa’a Abid Ali K.

Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication,  data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, ... see more

Pags. 41 - 46  

muthana salih mahdi,Saad N. Alsaad

Today the technology age is characterized by spreading of digital images. The most common form of transfer the information in magazines, newspapers, scientific journals and all types of social media.  This huge use of images technology has been accom... see more

Pags. 47 - 53  

Sadiq A. Mehdi,zaydon latif ali

Due to the rapid evaluation in the field of communications and multimedia and the increasing use of the Internet, multimedia data security has become very urgent. of the best alternative way to achieve multimedia data security is encryption, which prevent... see more

Pags. 54 - 63  

nadia ali nadhim,Haider J. Ali,Rasha N. Majeed

The purpose of this paper is to provide a new important concept which is minimal -space (denoted by in-space or -space), also given some properties, examples, theorems and the topological property inin-space are discussed.????? ?? ??? ????? ?? ????? ?????... see more

Pags. 64 - 70  

Sallama Sadiq Hummadi,Omar Ahmed M. Safauldeen,Amani Abdullah kumeel,Anaam Musa Hadee,Raghdaa Hameed Honi

The nuclear structure for even-even nuclei  estimated by using interacting boson model (IBM-1). Also this program was used to determine energy levels of g- state, energy ratios and electric quadrupole transitions probability B(E2) which have been cal... see more

Pags. 71 - 75