Preferred Language
Articles
/
NRYJRocBVTCNdQwCMUAw
Morphometric Analysis of the Mental Foramen Variation in an Iraqi Population by Using Cone-Beam Computed Tomography
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weighted Residual Method for the System of Nonlinear Volterra Integral Equations of the Second Kind Using an Exponential Function
...Show More Authors

The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner,  Taylor manner and block- by- block(2, 3, 5).

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 30 2018
Journal Name
Civil Engineering Journal
Performance of Post-Fire Composite Prestressed Concrete Beam Topped with Reinforced Concrete Flange
...Show More Authors

The performance of composite prestressed concrete beam topped with reinforced concrete flange structures in fire depends upon several factors, including the change in properties of the two different materials due to fire exposure and temperature distribution within the composition of the composite members of the structure. The present experimental work included casting of 12 identical simply supported prestressed concrete beams grouped into 3 categories, depending on the strength of the top reinforced concrete deck slab (20, 30, and 40 MPa). They were connected together by using shear connector reinforcements. To simulate the real practical fire disasters, 3 composite prestressed concrete beams from each group were exposed to high t

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Buckling Behavior of Aluminum Alloy Thin-Walled Beam with Holes under Compression Loading
...Show More Authors

Thin-walled members are increasingly used in structural applications, especially in light structures like in constructions and aircraft structures because of their high strength-to-weight ratio. Perforations are often made on these structures for reducing weight and to facilitate the services and maintenance works like in aircraft wing ribs. This type of structures suffers from buckling phenomena due to its dimensions, and this suffering increases with the presence of holes in it. This study investigated experimentally and numerically the buckling behavior of aluminum alloy 6061-O thin-walled lipped channel beam with specific holes subjected to compression load. A nonlinear finite elements analysis was used to obtain the

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Useing the Hierarchical Cluster Analysis and Fuzzy Cluster Analysis Methods for Classification of Some Hospitals in Basra
...Show More Authors

In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectral Study of the Pollutants ( Gelbstoff) in Water Liquefaction of Some areas of Baghdad Province by Using the Technique of Raman, Flora
...Show More Authors

  In this research we study one of the pollutants(Gelbstoff ) such as Humic  and Fulvic Acids  in tap waters by using the technique of  Raman, Flora to some regions of Baghdad , the results appear that the tap waters  were pollutants which know yellow substance or Gelbstoff instant of suspending waters, which appear through the scattering of the incident light to same the wave length of Raman ,also calculate Raman shift which was 3640 cm-1 and force constant to band (O – H ) was 743 N/m, where the peak of Raman was at the wave length 441 nm after used the excitation wave length 380 nm . The results were in an agreement with lectures [8][9][10].

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Therapeutic Advances In Drug Safety
Deferasirox in thalassemia: a comparative study between an innovator drug and its copy among a sample of Iraqi patients
...Show More Authors
Background:

The health care industry is witnessing an increasing trend in the use of generic medicines because of their presumed low cost compared with innovator medicines. The aim of this study was to determine and compare the performance of the copy drug Osveral®and its innovator drug deferasirox (Exjade®).

Methods:

A prospective observational study including 223 patients receiving the branded medicine Exjade®and 101 patients receiving the copy Osveral®was carried out. Data were assessed for a 1-year period and included clinical symptoms, serum ferrit

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Calculation and Analysis of the Total Electron Content Over Different Latitudes and Seasons Using the Numerical Trapezoidal and Simpson Methods
...Show More Authors

It has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref