|
|
|
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz
Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm...
ver más
|
|
|
|
|
|
|
Muna, B. Abdulazeez, Mustafa M. Haider
Pág. 1 - 9
Introduction: Citric acid (2-hydroxy-propane-1, 2, 3-tricarboxylic acid) was first isolated from lemon juice in 1784. It is a primary metabolic product which is formed in the tricarboxylic acid (Krebs) cycle. It is estimated that the market value of citr...
ver más
|
|
|
|
|
|
|
Mustafa-Nawaz Shafqat,Salina Shahid,Syed-Ali-Musstjab-Akber-Shah Eqani,Syed-Haider Shah,Amir Waseem
Pág. e070
Aims of the study: This study aims (i) to monitor the amount of dust deposition during dry season in the moist temperate forest; (ii) to study nature of P fractions in the dust samples falling on the trees in the region; (iii) to study soil P fractions a...
ver más
|
|
|
|