Preferred Language
Articles
/
RRf8fY8BVTCNdQwCjXo2
On Quasi-Small Prime Modules
...Show More Authors
Abstract<p>Let R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.</p>
Scopus Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Effect of Embedment on Generated Bending Moment in Raft Foundation under Seismic Load
...Show More Authors

This research shows the experimental results of the bending moment in a flexible and rigid raft foundation rested on dense sandy soil with different embedded depth throughout 24 tests. A physical model of dimensions (200mm*200mm) and (320) mm in height was constructed with raft foundation of (10) mm thickness for flexible raft and (23) mm for rigid raft made of reinforced concrete. To imitate the seismic excitation shaking table skill was applied, the shaker was adjusted to three frequencies equal to (1Hz,2Hz, and 3Hz) and displacement magnitude of (13) mm, the foundation was located at four different embedment depths (0,0.25B = 50mm,0.5B = 100mm, and B = 200mm), where B is the raft width. Generally, the maximum bending

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Biochem. Cell. Arch
STUDY ON THE MUTATION OF ASXL1 IN ACUTE MYELOID LEUKEMIA IN IRAQI PATIENTS
...Show More Authors

The present study was designed to shed light on the molecular effects caused by acute myeloid leukemia (AML). It was also aimed to investigate ASXL1 point mutations in newly AML patients as compared to healthy control. The study comprised of 43 AML Iraqi patients and their ages ranged between 16-75 years. It included 23 females and 20 males compared with 20 healthy controls. Results revealed that the extracted DNA from 30 AML patients and amplified by PCR to obtain ASXL1 gene from exon 12 showed larger bands (479). Among forty three patients, two of them displayed point mutations of deletion and substitution, while the others were normal since no mutations were detected. The total of mutations in two mutated patients was 27 mutations, the m

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 02 2020
Journal Name
Kufa Journal Of Engineering
PERFORMANCE OF SKIRTED CIRCULAR SHALLOW FOOTINGS RESTING ON SANDY SOIL UNDER INCLINED LOADS
...Show More Authors

Experimental tests were conducted to study the behavior of skirted foundations rested on dry medium sandy soil subjected to vertical and inclined loads. To achieve this goal, a small-scale physical model was designed and performed which contained an aluminum circular footing (100 mm) in diameter and (10 mm) in thickness and skirts with different heights, local medium poorly graded dry sand is placed in a steel soil container (2 mm) thick with internal dimensions (1000 mm x 1000 mm in cross section and 800 mm in height). The main objective of this study was to evaluate the response of skirt attached to the foundation at different skirt (L/D) ratios (0.0, 0.5, 1.0 and 1.5) and is subjected to point load at different angles of inclinat

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Renewable And Sustainable Energy Reviews
Review on the development of natural dye photosensitizer for dye-sensitized solar cells
...Show More Authors

View Publication
Scopus (372)
Crossref (349)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (33)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
THE EFFECTS OF BLOOD REHEOLOGICAL ON THE FLOW THROUGH AN AXISYMMETRIC ARTERIAL STENOSIS
...Show More Authors

The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Effect of the Concentration of Copper on the Properties of Copper Sulfide Nanostructure
...Show More Authors

Nanoparticles of copper sulfide have been prepared by simple reaction between using copper nitrate with different concentrations ratio 0.1, 0.3, and 0.5 mM, thiourea by a simple chemical route. The prepared Nano powders have been deposited onto glass substrates by casting method at 60°C. The structure of the product Nano- films has been studied by x-ray diffraction, where the patterns showed that all the samples have a hexagonal structure of covellite copper sulfide with the average crystalline sizes 14.07- 16.51 nm. The morphology has been examined by atomic force microscopy, and field emission scan electron microscopy. The AFM images showed particles with almost spherical and rod shapes with average diameter sizes of 49.11- 90.64 nm.

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
P J M H S
The influence of Breast Cancer Molecular Subtypes on Metastatic pattern in Iraqi patients
...Show More Authors

Scopus (4)
Scopus