Preferred Language
Articles
/
bsj-2439
Biodegradation of Anthracene Compound by Two Species of Filamentous Fungi
...Show More Authors

Isolation and identification fungi of Emericella nidulans and Aspergillus flavus from a pinkish and yellowish artificial clay, by using potato dextrose agar (PDA). Results revealed that E. nidulans was the best for degrading anthracene (92.3%) with maximum biomass production (3.7gm/l), compared to A. flavus with the rate of degradation (89%) and biomass production of (1.2gm/l), when methylene blue was used as redox indicator after incubating in a shaker incubator 120rpm at 30Co for 8days. Results indicated that E. nidulans has a high ability of anthracene degradation with the rate of (84%), while A. flavus showed the lower level with (77%) by using HPLC.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 28 2014
Journal Name
Journal Of Energy And Power Engineering
Comparison between Two Vertical Enclosures Filled With Porous Media under the Effect of Radiation and Magnetohydrodynamics
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Electric Power Systems Research
Analytical and measurement-based wideband two-port modeling of DC-DC converters for electromagnetic transient studies
...Show More Authors

Power-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayes Estimators With others , for scale parameter and Reliability function of two parameters Frechet distribution
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Thi – Qar Science
Enhanced of the Two photon Absorption in Nanostructure Wide Band gap Semiconductor CdS using femtosecond Laser
...Show More Authors

We observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and

View Publication
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Comparative sensitivity of two freshwater snail Melanopsis nodosa and Bulinus truncatus to 2, 4-D pesticide
...Show More Authors

The molluscicidal effects of herbicide 2, 4-D were studied against tow species of freshwater snail Bulinus truncatus and Melanopsis nodosa by short term experiments. Calculated values of lethal concentrations (LC50 and LC100) were maid to two spices for different period of time 24hr, 48hr, 72hr and 96hr. The study had showed that the herbicide 2, 4-D was toxic against the tow species. The toxicity of the herbicide was low or unknown in low concentrations in the first period of exposure 24and 48hr to two spices but it increase gradually with increase period of exposure. The spice of B.truncatus was more tolerant than the M.nodosa. All the individual of M nodosa was death while in B.truncatus the complete death was not appear until finish the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Sun Sep 25 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
Design and Fabrication of an Electromechanical Tester to Perform Two-dimensional Tensile Testing for Flexible Materials
...Show More Authors

There are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i

... Show More
Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Genetic Algorithm Based PID Controller Design for a Precise Tracking of Two-Axis Piezoelectric Micropositioning Stage
...Show More Authors

 In this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Study the Efficiency of Two Concentrations from Algae Cladophora glomerata Extract on the Giardia lamblia parasite
...Show More Authors

Giardia lamblia parasite was isolated from the diarrhea samples of patients with Giardiasis dysentery and was developed in HSP media, four mice groups have been used to find in vivo efficacy of two concentrations (128,256) mg/ml of chlorophorm extracts from Cladophora glomerata algae against Giardia lamblia parasite  as compared with (Flagyl) by measuring several biochemical markers as ( GPT and GOT) enzymes ,sodium ,potassium and iron concentration as well as counting the number of parasitic cysts in each mice groups. The results demonstrate that levels of GPTA GOT enzymes have been decreased in mice treated with algal extract. As for the concentration of the Sodium, Potassium and Iron increased in mice treat

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref