Preferred Language
Articles
/
bsj-762
Production of fibrinolytic protease from various fungal isolates and species 2.Determination of optimum conditions for enzyme production from Pleurotus ostreatus
...Show More Authors

The optimum conditions for production of fibrinolytic protease from an edible mushroom Pleurotus ostreatus grown on the solid medium , Sus medium, composed of Sus wastes (produced from extracted medicinal plant Glycyrrhiza glabra) were determined. Addition of 5% of Soya bean seeds meal in Sus medium recorded a maximum fibrinolytic protease activity resulting in 7.7 units / ml. The optimum moisture content of Sus medium supplemented with 5% Soya bean seeds meal was 60% resulting in 7.2 units / ml.Pleurotus ostreatus produced a maximum fibrinolytic protease activity when the spawn rate,pH of medium and incubation temperature were 2,6 and 30°C, respectively. The maximum fibrinolytic protease activity was 7.6 units / ml when incubation period of Pleurotus ostreatus at the end of 3rd week (vegetative or mycelium stage), then lowered to 6.2 and 4.4 units/ml in the end of 4th week (reproduction or fruit bodies stage) and 5th week (after harvesting of fruit bodies), respectively. Although the minimum fibrinolytic protease activity was recorded in the end of 4th and 5th weeks, production of fibrinolytic protease regard to a byproduct after harvesting of fruit bodies.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Wireless Communications And Mobile Computing
Developing a real time navigation for the mobile robots at unknown environments
...Show More Authors

<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the

... Show More
Scopus (12)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Parallel Particle Swarm Optimization Algorithm for Identifying Complex Communities in Biological Networks
...Show More Authors

    Identification of complex communities in biological networks is a critical and ongoing challenge since lots of network-related problems correspond to the subgraph isomorphism problem known in the literature as NP-hard. Several optimization algorithms have been dedicated and applied to solve this problem. The main challenge regarding the application of optimization algorithms, specifically to handle large-scale complex networks, is their relatively long execution time. Thus, this paper proposes a parallel extension of the PSO algorithm to detect communities in complex biological networks. The main contribution of this study is summarized in three- fold; Firstly, a modified PSO algorithm with a local search operator is proposed to d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials &amp; Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 29 2013
Journal Name
Wireless Personal Communications
A Low Cost Route Optimization Scheme for Cluster-Based Proxy MIPv6 Protocol
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Sep 27 2014
Journal Name
Soft Computing
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks
...Show More Authors

View Publication
Scopus (30)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Runge-Kutta Method for Oscillatory Problem Solution Using Trigonometric Fitting Approach
...Show More Authors

This paper provides a four-stage Trigonometrically Fitted Improved Runge-Kutta (TFIRK4) method of four orders to solve oscillatory problems, which contains an oscillatory character in the solutions. Compared to the traditional Runge-Kutta method, the Improved Runge-Kutta (IRK) method is a natural two-step method requiring fewer steps. The suggested method extends the fourth-order Improved Runge-Kutta (IRK4) method with trigonometric calculations. This approach is intended to integrate problems with particular initial value problems (IVPs) using the set functions  and   for trigonometrically fitted. To improve the method's accuracy, the problem primary frequency  is used. The novel method is more accurate than the conventional Runge-Ku

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determine Most Stable Isobar for Nuclides with A= (15-30) & (101- 115)
...Show More Authors

In this study the most stable isobar for some isobaric families (light and  intermediate ) nuclei with mass number (A) equals to (15-30) & (101- 115) have been determined. This determination of stable nuclide can help to determine the suitable nuclide, which can be used in different fields.

Most stable isobar can be determined by two means. First: plot mass parabolas (plotting the binding energy (B.E) as a function of the atomic number (Z)) for these isobaric families, in this method most stable isobars represent the lowest point in mass parabola (the nuclide with the highest value of binding energy).

Second: calculated the atomic number for most stable isobar (ZA) value.

Our results show that

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF