10 articles in this issue
Ramia M. Mahmood,Ahmed Sami Hassan
Analysis of the jet stream is diagnostic over Baghdad for period studies 2012 to 2014 using Radiosonde data and synoptic charts. The source of data is Iraq Meteorological Organization and Seismology (IMOS). Similar way for weather forecasts to identify ar... see more
Dalal Subree Bedan
This study aimed to extract urease enzyme from available plant source which was broad beans (Vicia faba L.) using aqueous solution in a ratio1:3(w:v) .The crude extract appeared enzyme activity 33.3 U/ml. Results of this study revealed the possibility to ... see more
Dr.Neihaya Heikmat Zaki
Twenty five samples were collected from the soil around the Tigris River from different locations in Iraqi cities, and 45 bacterial isolates were obtained. Three of these isolates were further tested for their degrading capacity of Bisphenol A (BPA) in Ba... see more
Shahad Bashir,Amal Abdul Salam Al-Habib
This study was conducted in the botanical garden, Department of biology, College of Science/ Mustansiriyah University in from (15 February to 15 March, 2019) under the natural environmental conditions in the greenhouse in order to evaluate the effectivene... see more
nadia azeez betti,Redha Ib. Hussain,Sahar Ab. Kadhem
In this research a number of pyrrolidine-2-one derivatives were prepared by lactamization of ? –butyrolactone (GBL) with hydrazine hydrate (80%) to produce (1-aminopyrrolidine-2-one) that undergoes several reactions to afford these derivatives that diagno... see more
Ansam Sabah Bader,Shaymaa Hameed,Maisa’a Abid Ali K.
Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication, data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, ... see more
muthana salih mahdi,Saad N. Alsaad
Today the technology age is characterized by spreading of digital images. The most common form of transfer the information in magazines, newspapers, scientific journals and all types of social media. This huge use of images technology has been accom... see more
Sadiq A. Mehdi,zaydon latif ali
Due to the rapid evaluation in the field of communications and multimedia and the increasing use of the Internet, multimedia data security has become very urgent. of the best alternative way to achieve multimedia data security is encryption, which prevent... see more
nadia ali nadhim,Haider J. Ali,Rasha N. Majeed
The purpose of this paper is to provide a new important concept which is minimal -space (denoted by in-space or -space), also given some properties, examples, theorems and the topological property inin-space are discussed.????? ?? ??? ????? ?? ????? ?????... see more
Sallama Sadiq Hummadi,Omar Ahmed M. Safauldeen,Amani Abdullah kumeel,Anaam Musa Hadee,Raghdaa Hameed Honi
The nuclear structure for even-even nuclei estimated by using interacting boson model (IBM-1). Also this program was used to determine energy levels of g- state, energy ratios and electric quadrupole transitions probability B(E2) which have been cal... see more