Preferred Language
Articles
/
Ihfv840BVTCNdQwCBioU
Investigations for the critical vehicle velocities on a curved path
...Show More Authors

􀀨􀀅􀀆􀀔􀀜􀀄􀀂􀀆􀀈􀀓􀀌􀀩􀀏􀀆􀀉􀀅􀀆􀀉􀀅􀀉􀀚􀀝􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀓􀀚􀀁􀀔􀀄􀀓􀀅􀀆􀀄􀀂􀀆􀀔􀀓􀀆􀀃􀀂􀀔􀀄􀀟􀀉􀀔􀀃􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀘􀀃􀀃􀀊􀀂􀀆􀀓􀀖􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆 􀀉􀀌􀀃􀀆􀀙􀀉􀀂􀀃􀀊􀀆􀀓􀀅􀀆􀀉􀀁􀀔􀀓􀀟􀀓􀀙􀀄􀀚􀀃􀀆􀀚􀀉􀀔􀀃􀀌􀀉􀀚􀀆􀀂􀀘􀀉􀀗􀀃􀀆􀀟􀀄􀀊􀀂􀀔􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀚􀀄􀀅􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀙􀀉􀀂􀀃􀀆􀀈􀀜􀀃􀀃􀀚􀀂􀀆􀀉􀀔􀀆􀀌􀀓􀀉􀀊􀀆􀀫􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀑􀀆􀀉􀀅􀀊􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀆􀀓􀀖􀀆􀀕􀀌􀀉􀀛􀀄􀀔􀀝􀀆 􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀫􀀠􀀬􀀑􀀢􀀆􀀪􀀜􀀃􀀆􀀂􀀔􀀁􀀊􀀝􀀆􀀓􀀁􀀔􀀗􀀓􀀟􀀃􀀂􀀆􀀄􀀚􀀚􀀁􀀂􀀔􀀌􀀉􀀔􀀃􀀊􀀆􀀔􀀜􀀉􀀔􀀆􀀈􀀜􀀃􀀅􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀊􀀄􀀟􀀃􀀅􀀂􀀄􀀓􀀅􀀂􀀆􀀛􀀉􀀌􀀄􀀃􀀂􀀆􀀔􀀜􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆 􀀗􀀉􀀅􀀆􀀙􀀃􀀆􀀛􀀉􀀌􀀄􀀃􀀊􀀆􀀉􀀅􀀊􀀆􀀙􀀃􀀗􀀓􀀟􀀃􀀂􀀆􀀚􀀃􀀂􀀂􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀏􀀆􀀂􀀓􀀆􀀉􀀂􀀆􀀔􀀓􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀆􀀓􀀌􀀆􀀔􀀜􀀃􀀆􀀠􀀬􀀆􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀄􀀅􀀗􀀌􀀃􀀉􀀂􀀃􀀂􀀆􀀔􀀜􀀉􀀔􀀆􀀚􀀃􀀉􀀊􀀂􀀆􀀔􀀓􀀆􀀌􀀃􀀊􀀁􀀗􀀃􀀆􀀔􀀜􀀃􀀆 􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀏􀀆􀀄􀀅􀀆􀀓􀀔􀀜􀀃􀀌􀀆􀀈􀀓􀀌􀀊􀀂􀀏􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀓􀀅􀀊􀀄􀀔􀀄􀀓􀀅􀀆􀀈􀀄􀀚􀀚􀀆􀀙􀀃􀀆􀀟􀀓􀀌􀀃􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀢􀀆􀀒􀀃􀀉􀀅􀀈􀀜􀀄􀀚􀀃􀀏􀀆􀀄􀀖􀀆􀀔􀀜􀀃􀀆􀀌􀀉􀀔􀀄􀀓􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆 􀀈􀀄􀀊􀀔􀀜􀀆􀀔􀀓􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀆􀀓􀀖􀀆􀀕􀀌􀀉􀀛􀀄􀀔􀀝􀀆􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀄􀀅􀀗􀀌􀀃􀀉􀀂􀀃􀀂􀀆􀀔􀀜􀀉􀀔􀀆􀀈􀀄􀀚􀀚􀀆􀀚􀀃􀀉􀀊􀀆􀀔􀀓􀀆􀀌􀀄􀀂􀀃􀀆􀀔􀀜􀀃􀀆􀀂􀀉􀀖􀀃􀀔􀀝􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀟􀀉􀀅􀀃􀀁􀀛􀀃􀀌􀀢􀀆􀀭􀀄􀀔􀀃􀀌􀀉􀀔􀀁􀀌􀀃􀀏􀀆􀀘􀀓􀀄􀀅􀀔􀀃􀀊􀀆 􀀔􀀜􀀉􀀔􀀆􀀔􀀜􀀃􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀄􀀂􀀂􀀁􀀃􀀆􀀗􀀉􀀅􀀆􀀙􀀃􀀆􀀂􀀓􀀚􀀛􀀃􀀊􀀆􀀔􀀜􀀌􀀓􀀁􀀕􀀜􀀆􀀁􀀔􀀄􀀚􀀄􀀮􀀄􀀅􀀕􀀆􀀉􀀆􀀙􀀉􀀅􀀩􀀄􀀅􀀕􀀆􀀓􀀅􀀆􀀔􀀜􀀃􀀆􀀌􀀓􀀉􀀊􀀆􀀉􀀂􀀆􀀗􀀓􀀅􀀂􀀔􀀌􀀁􀀗􀀔􀀃􀀊􀀆􀀈􀀄􀀔􀀜􀀆􀀌􀀉􀀗􀀄􀀅􀀕􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀓􀀌􀀆􀀈􀀄􀀔􀀜􀀆􀀂􀀓􀀆 􀀚􀀄􀀟􀀄􀀔􀀃􀀊􀀆􀀌􀀓􀀉􀀊􀀆􀀗􀀓􀀅􀀂􀀔􀀌􀀁􀀗􀀔􀀄􀀓􀀅􀀢􀀆􀀀􀀓􀀈􀀃􀀛􀀃􀀌􀀏􀀆􀀟􀀓􀀂􀀔􀀚􀀝􀀆􀀔􀀜􀀃􀀆􀀌􀀓􀀉􀀊􀀂􀀆􀀊􀀃􀀂􀀄􀀕􀀅􀀆􀀊􀀓􀀆􀀅􀀓􀀔􀀆􀀜􀀉􀀛􀀃􀀆􀀉􀀆􀀙􀀉􀀅􀀩􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀌􀀃􀀖􀀓􀀌􀀃􀀏􀀆􀀔􀀜􀀃􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀆 􀀂􀀜􀀓􀀁􀀚􀀊􀀆􀀙􀀃􀀆􀀄􀀊􀀃􀀅􀀔􀀄􀀖􀀄􀀃􀀊􀀆􀀔􀀓􀀆􀀛􀀉􀀌􀀄􀀓􀀁􀀂􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀃􀀉􀀔􀀄􀀓􀀅􀀂􀀆􀀔􀀓􀀆􀀗􀀓􀀅􀀔􀀌􀀓􀀚􀀆􀀓􀀛􀀃􀀌􀀆􀀔􀀜􀀉􀀔􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆􀀂􀀜􀀓􀀈􀀆􀀔􀀜􀀉􀀔􀀆􀀔􀀜􀀃􀀆 􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀝􀀆􀀈􀀄􀀚􀀚􀀆􀀙􀀃􀀆􀀎􀀎􀀢􀀐􀀆􀀟􀀯􀀂􀀆􀀈􀀜􀀃􀀅􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀆􀀄􀀂􀀆􀀐􀀆􀀟􀀆

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Adsorption Study for Chromium (VI) on Iraqi Bentonite
...Show More Authors

The subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref