Preferred Language
Articles
/
MRhcfZQBVTCNdQwCzRvH
A New Regimen in the Treatment of Psoriasis Using Oral Methotrexate
...Show More Authors

Crossref
View Publication
Publication Date
Fri Jan 31 2020
Journal Name
Iraqi Geological Journal
Manufacturing Perforated and Ordinary Bricks Using Injana Claystone Exposed in The Middle of Iraq
...Show More Authors

This study aims to use claystone beds exposed in the Injana Formation (Late Miocene) at Karbala-Najaf plateau, middle of Iraq for the manufacturing of perforated and ordinary bricks. The claystone samples were assessed as an alternative material of the recent sediments, which are preferred to remain as agricultural land. The claystones are sandy mud composing of 29.1 - 39.1% clay, 37.2 - 54.8% silt and 14.1-26.8% sand. They consist of kaolinite, illite, chlorite, palygorskite, and montmorillonite with a lot of quartz, calcite, dolomite, gypsum and feldspar. Claystone samples were characterized by linear shrinkage 0.01 - 0.1%, volume shrinkage 0.1 - 0.9%, bulk density 1.2 - 2.11gm/cm3 (1.68 g / cm3 average), and the efflorescence is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of the Rock Mechanical Properties Using Conventional Log Data in North Rumaila Field
...Show More Authors

Hydrocarbon production might cause changes in dynamic reservoir properties. Thus the consideration of the mechanical stability of a formation under different conditions of drilling or production is a very important issue, and basic mechanical properties of the formation should be determined. There is considerable evidence, gathered from laboratory measurements in the field of Rock Mechanics, showing a good correlation between intrinsic rock strength and the dynamic elastic constant determined from sonic-velocity and density measurements. The values of the mechanical properties determined from log data, such as the dynamic elastic constants derived from the measurement of the elastic wave velocities in the material, should be more accurate t

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
The impact of node density over routing protocols in manet by using NS-3
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Dec 19 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST PHOTOGRAPHIC RECORDS AND NEW DISTRIBUTION RANGE OF THE ENDANGERED LONG-TAILED NESOKIA NESOKIA BUNNII (KHAJURIA, 1981)
...Show More Authors

In the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis of Some New Schiff Bases Starting from 2,2 Dimorpholinyl Acetic Acid and Evaluating the Biological activity
...Show More Authors

n this study new derivatives of Schiff bases (5-10) were synthesized from the new starting material 1 . Which has been synthesized by the reaction of (1 mol.) of dichloroacetic acid with two moles of morpholine, in the presence of potassium hydroxide, Ester derivatives 2 and 3 were synthesized by the reaction of 1 with methanol or ethanol respectively in the presence of sulphuric acid as catalyst . Compound 2 was also prepared from dimethylsulphate with high yield , 2 and 3 was used to synthesized 2,2-dimorpholinylacetohydrazide 4 via reaction with NH2NH2.H2O 80% .Imines (5-10) were synthesized via the reaction of 4 with appropriate aromatic aldehydes in the presence of G.A.A as a catalyst . Derivatives compounds (1-10) were identifie

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Transform Fundamental Properties and Its Applications
...Show More Authors

        In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.

Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.

View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More