Preferred Language
Articles
/
bsj-544
PREPARATION OF NITRATION DERIVATIVES OF BILE SALTS AND ACIDS FOR MEDICAL USE
...Show More Authors

The derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
The Computational Fluid Dynamic Simulations for Gangrene Disease in Diabetic Foot
...Show More Authors

The diabetic foot is considered one of the long term diabetes complications caused by a defect in blood vessel and nerve system. This requires dealing with diabetic foot with professional medical care, so as to prevent its development in advanced stages which could end to gangrene and amputation of the foot. This study has been initiated through follow-up of twelve patients with diabetes and the presence various occlusions in lower limb artery. One patient from them was chosen for investigation, this patient has stenosis in popliteal artery and presence multiple stenosis in superficial femoral artery. This study based on analysis present case of patient and prediction for progress stenosis in superficial femoral artery till arrive semi t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Cox proportion hazard model for patients with hepatitis disease in Iraq
...Show More Authors

Cox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.

View Publication Preview PDF
Crossref
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
...Show More Authors

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Chemistry And Physics
BC2N nanotube as a promising anode for rechargeable calcium ion batteries
...Show More Authors

Because of cost-effective production and abundant resources of calcium, Ca-ion batteries (CIBs) are an appropriate option to alternate Li-ion batteries (LIBs). A new category of anode materials for CIBs has emerged since the successful synthesis of carbon nanotubes, which are B and N doped derivatives of it. For high-performance CIBs, BC2N nanotube (BC2NNT) has been studied as promising anode materials. In order to comprehend electrochemical attributes, cycling stability, and adsorption behavior of BC2NNT, first-principles computations have been executed. Based on nuclear magnetic resonance computations, two types of hexagonal rings (B2C2N2 (I) and BC4N (II)) were specified that are non-aromatic. Ca has adsorption on B2C2N2 and BC4N with ad

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Implementing a Smart Low-Cost System for Diagnosing Bacteria in Women
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF