Preferred Language
Articles
/
bsj-2115
The Effect of The Electrochemical Deposition Potential Variation on The Coating of Hydroxyatite on Commertialy pure Titanium (CpTi) and Ti-6Al-4V Alloy
...Show More Authors

In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jul 01 2010
Journal Name
International Journal Of Advancements In Computing Technology
Implementation of digital chaotic signal generator based on reconfigurable LFSRs for multiple access communications
...Show More Authors

This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec

... Show More
Scopus (3)
Scopus
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effects of Hypothermia on Renal Functions for Patients undergo Coronary Artery Bypass Graft Surgery
...Show More Authors

Objective: To determine the effectiveness of hypothermia on renal functions for patients undergoing
coronary artery bypass graft CABG surgery.
Methodology: A purposive (non-probability) sample of (50) patients undergoing Isolated coronary artery
bypass graft surgery consecutively admitted to the surgical ward, and they were followed up in the
intraoperative, Intensive Care Unit (ICU) and in the postoperative (surgical ward). Post-operative renal function
test (glumeruler filteration rate (GFR) by using the Crockroft-Gault formula and serum creatinine level) was
determined first week post operative and post operative renal function was classified on the base of peak of
the serum creatinine level and decline of glomeru

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of osteoporosis prevention instruction program on nursing college students’ knowledge at Baghdad University
...Show More Authors

Objective(s): Assess the effectiveness of osteoporosis prevention instruction program on nursing college students’
knowledge at Baghdad University.
Methodology: A quasi-experimental design was used to assess the effectiveness of osteoporosis prevention
instruction program on nursing college students at University of Baghdad from April 2011 to September 2011. A
random sample consisted of (40) females students from first year of Nursing College \ Baghdad University. The data
was collected by using constructed questionnaire, which consists of three parts. Part one: consists of demographic
information and health characteristics .Part two: consists of students’ daily life behaviors which include, dietary
behaviors, an

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Mobile Position Estimation based on Three Angles of Arrival using an Interpolative Neural Network
...Show More Authors

In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf

... Show More
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Wed Jun 02 2010
Journal Name
Journal Of Engineering
Bearing capacity of square footing on geogrid reinforced loose sand to resist eccentric load
...Show More Authors

This research presents and discuss the results of experimental investigation carried out on geogrids model to study the behavior of geogrid in the loose sandy soil. The effect of location eccentricity, depth of first layer of reinforcement, vertical spacing, number and type of reinforcement layers have been investigated. The results indicated that the percentage of bearing improvement a bout (22 %) at number of reinforced layers N=1 and about (47.5%) at number of reinforced layers N=2 for different Eccentricity values when depth ratio and vertical spacing between layers are (0.5B and 0.75B) respectively

Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Cancer And Medical Genetics
Cytotoxicity of purified methionine γ- lyase produced by Pseudomonas putida on several cell lines
...Show More Authors

The cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).

Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Efficacy of Saccharomyces cerevesiae on promoting growth in tomato: Nahida M.Saleh |Adnan A. Issa
...Show More Authors

This study was conducted to evaluate the efficacy of Saccharomyces cerevesiae as a growth promoting agent in tomato. Soaking the seeds in yeast suspension at 5 g/L for 12h increased germination percentage, root length, root fresh and dry weight, plant height, foliage fresh and dry weight, attained 88.5% ; 8.1 cm ; 84.3 mg ; 7.03 mg ; 10.75 cm ; 839 mg and 37.75 mg compared with 80% ; 5.33 cm ; 39 mg ; 4.8 mg ; 7.35 cm ; 608 mg and 25.5 mg in seedlings grown from non treated seeds respectively. Similar results were obtained with seedling from seeds soaked in S. cerevesiae filtrate for 12 hrs. with values of 77.5% ; 6.875 cm ; 91.5 mg ; 7.5 mg ; 9.5 cm ; 777 mg and 40.35 mg compared to 66% ; 5.8 cm ; 57.7 mg ; 5.03 mg ; 5.9 cm ; 493 mg

... Show More
View Publication
Crossref