Preferred Language
Articles
/
AhbNoYoBVTCNdQwCoKLt
Describing the Wavefront Aberrations of the Hexagonal Aperture Using Modified Zernike Polynomials
...Show More Authors

n Segmented Optical Telescope (NGST) with hexagonal segment of spherical primary mirror can provide a 3 arc minutes field of view. Extremely Large Telescopes (ELT) in the 100m dimension would have such unprecedented scientific effectiveness that their construction would constitute a milestone comparable to that of the invention of the telescope itself and provide a truly revolutionary insight into the universe. The scientific case and the conceptual feasibility of giant filled aperture telescopes was our interested. Investigating the requirements of these imply for possible technical options in the case of a 100m telescope. For this telescope the considerable interest is the correction of the optical aberrations for the coming wavefront, the modified Zernike polynomials for hexagonal aperture were used to describe the wavefront aberrations and to predict the initial state for the adaptive optics corrections.

Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Bridge Engineering
Torsional Analysis of Multicell Concrete Box Girders Strengthened with CFRP Using a Modified Softened Truss Model
...Show More Authors

Scopus (28)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (26)
Crossref (9)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adsorption of Thymol From Aqueous Solution Using Granulated Surfactant Initiated Modified Bentonite via Packed Column Method
...Show More Authors

    The adsorption study of thymol, was carried out at (25±0.1) °C, using granulated surfactant modified Iraqi Na – montmorillonite clay (initiated modified bentonite); in a down-flow packed column, the modified mineral was characterized by FT-IR spectroscopy.  A linear calibration graph for thymol was obtained, which obey Beer's law in the concentration range of 5-50 mg/L at 274 nm against reagent blank. Single-factor-at-a-time approach; showed that the equilibrium time required for complete adsorption was 45 minute with flow rate (4.0drop/ mint). The adsorption of thymol increased with rising pH of the adsorbate solution, increase of solute uptake when  the initial adsor

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Removal of Acidic Dye from Aqueous Solution Using Surfactant Modified Bentonite (Organoclay): Batch and Kinetic Study
...Show More Authors

Modified bentonite has been used as effective sorbent material for the removal of acidic dye (methyl orange) from aqueous solution in batch system. The natural bentonite has been modified using cationic surfactant (cetyltrimethyl ammonium bromide) in order to obtain an efficient sorbent through converting the properties of bentonite from hydrophilic to organophilic. The characteristics of the natural and modified bentonite were examined through several analyses such as Scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), and Surface area. The batch study was provided the maximum dye removal efficiency of 88.75 % with a sorption capacity of 555.56 mg/g at specified conditions (150 min, pH= 2, 250 rpm, and 0.

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Overlapping Structure Detection in Protein-Protein Interaction Networks Using a Modified Version of Particle Swarm Optimization
...Show More Authors

In today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (40)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
USE OF MODIFIED MAXIMUM LIKELIHOOD METHOD TO ESTIMATE PARAMETERS OF THE MULTIPLE LINEAR REGRESSION MODEL
...Show More Authors

Scopus
Publication Date
Wed Aug 10 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on the Harvested Modified Leslie–Gower Model Involving Nonlinear Prey Refuge
...Show More Authors

Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und

... Show More
View Publication
Scopus (14)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of The Microleakage of Polyacid Modified Composite Compared to Hybrid Composite and Resin Modified Glass Ionomer Cement in Primary and Permanent Teeth Restoration (An in vitro study)
...Show More Authors

Background: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More