5   Artículos

 
en línea
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz     Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm... ver más

 
en línea
Muna, B. Abdulazeez, Mustafa M. Haider     Pág. 1 - 9
Introduction: Citric acid (2-hydroxy-propane-1, 2, 3-tricarboxylic acid) was first isolated from lemon juice in 1784. It is a primary metabolic product which is formed in the tricarboxylic acid (Krebs) cycle. It is estimated that the market value of citr... ver más
Revista: Innovaciencia    Formato: Electrónico

 
en línea
Mustafa-Nawaz Shafqat,Salina Shahid,Syed-Ali-Musstjab-Akber-Shah Eqani,Syed-Haider Shah,Amir Waseem     Pág. e070
Aims of the study: This study aims (i) to monitor the amount of dust deposition during dry season in the moist temperate forest; (ii) to study nature of P fractions in the dust samples falling on the trees in the region; (iii) to study soil P fractions a... ver más
Revista: Forest Systems    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »