Preferred Language
Articles
/
bsj-6541
Efficient Approach for Solving (2+1) D- Differential Equations
...Show More Authors

     In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Synthesis of Some Heterocyclic Compounds derived from 2-mercapto pyrimidine
...Show More Authors

In this work 2-hydrazino pyrimidine (1) was prepared from 2-mercapto pyrimidine with hydrazine hydrate. Treatment of (1) with active methylene compounds gave 2-(3,5-dimethyl -1 H – Pyrazole-1-yl) pyrimidine , whereas the reaction of (1) with carboxylic anhydride namely maleic anhydride or 1,2,3,6-tetra hydro phthalic anhydride yielded 1-Pyrimidine-2-yl-1,2-dihydro pyridazine-3,6-dione (3) and 2 – Pyrimidin -2-yl -2,3,4 a ,5,8 a – hexahydro phthalazine 1,4 – dione (4) . Reaction of (1) with phenyl isothiocyanate and ethyl chloro acetate afforded 3-Phenyl-1,3-thiazolidine-2,4-dione-2( pyrimidine -2- yl hydrazone (6) Azomethine (7-10) were prepared through condensation of (1) with aromatic aldehydes or ketones, then comp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Materials Research Bulletin
Fabrication of CdSe nanoparticles sensitized TiO 2 nanotube arrays via pulse electrodeposition for photoelectrochemical application
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of The College Of Basic Education, Al-mustansiriyah University
Artin Exponent for the special linear group SL(2,pk)where pk = 9,25 and 27
...Show More Authors

Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Dyslipidemia among patients with type 2 diabetes mellitus visiting Specialized Center for Diabetes and Endocrinology
...Show More Authors

Background:The most common pattern of dyslipidemia in diabetic patients is increased triglyceride (TG) and decreased HDL cholesterol level, The concentration of LDL cholesterol in diabetic patients is usually not significantly different from non diabetic individuals, Diabetic patients may have elevated levels of non-HDL cholesterol [ LDL+VLDL]. However type 2 diabetic patients typically have apreponderance of smaller ,denser LDL particles which possibly increases atherogenicity even if the absolute concentration of LDL cholesterol is not significantly increased. The Third Adult Treatment Panel of the National Cholesterol Education Program (NCEP III) and the American Heart Association (AHA ) have designate diabetes as a coronary heart dis

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Unit Price and Cost Estimation Equations through Items Percentage of Construction Works in a Desert Area
...Show More Authors

This research will cover different aspects of estimating process of construction work in a desert area. The inherent difficulties which accompany the cost estimating of the construction works in desert environment in a developing country, will stem from the limited information available, resources scarcity, low level of skilled workers, the prevailing severe weather conditions and many others, which definitely don't provide a fair, reliable and accurate estimation. This study tries to present unit price to estimate the cost in preliminary phase of a project.  Estimations are supported by developing mathematical equations based on the historical data of maintenance, new construction of managerial and school projects.

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 27 2022
Journal Name
Journal Of Chemical Technology & Biotechnology
Broad‐ranging review: configurations, membrane types, governing equations, and influencing factors on microbial desalination cell technology
...Show More Authors
Abstract<p>Seawater might serve as a fresh‐water supply for future generations to help meet the growing need for clean drinking water. Desalination and waste management using newer and more energy intensive processes are not viable options in the long term. Thus, an integrated and sustainable strategy is required to accomplish cost‐effective desalination via wastewater treatment. A microbial desalination cell (MDC) is a new technology that can treat wastewater, desalinate saltwater, and produce green energy simultaneously. Bio‐electrochemical oxidation of wastewater organics creates power using this method. Desalination and the creation of value‐added by‐products are expected because of this ionic mov</p> ... Show More
View Publication
Scopus (24)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Applying the WaterGEMS Software to Conduct a Comparison of the Darcy-Weisbach and Hazen-Williams Equations for Calculating the Frictional Head Loss in a Selected Pipe Network
...Show More Authors

Darcy-Weisbach (D-W) is a typical resistance equation in pressured flow; however, some academics and engineers prefer Hazen-Williams (H-W) for assessing water distribution networks. The main difference is that the (D-W) friction factor changes with the Reynolds number, while the (H-W) coefficient is a constant value for a certain material. This study uses WaterGEMS CONNECT Edition update 1 to find an empirical relation between the (H-W) and (H-W) equations for two 400 mm and 500 mm pipe systems. The hydraulic model was done, and two scenarios were applied by changing the (H-W) coefficient to show the difference in results of head loss. The results showed a strong relationship between both equations with correlation coefficients of 0.999,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Superconducting Properties of the (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x Nix O10+? System.
...Show More Authors

The effect of substitution of Ni on Cu in (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x Nix O10+? for (x=0,0.1….1,2,3) superconductor system and sintering time has been investigated .The samples were prepared by solid-state reaction methods. The results show that the optimum sintering temperature is equal to 850 ºC, and the sintering time is equal to 140 h. The highest transition temperature (Tc) obtained for (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x NixO10+? composition was 113 with x=0.8 Phase analyses of the samples by X-ray diffraction (XRD) analysis showed an orthorhombic structure with a high Tc phases (2223) as a dominant phase and low Tc phase (2212) in addition to some impurity phases.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 29 1997
Journal Name
كلية العلوم للبنات
Synthesis And Studies Of Complexes Of Some Elements With 2-Mercaptohiazole (2-HMBT)
...Show More Authors

Synthesis And Studies Of Complexes Of Some Elements With 2-Mercaptohiazole (2-HMBT)

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref