Preferred Language
Articles
/
dxaS2IcBVTCNdQwCPGpV
Perception of Mg adsorption on the BC2N nanotube as a anode for rechargeable Mg ion batteries
...Show More Authors

Owing to their cost-effectiveness and the natural abundance of magnesium, magnesium-ion batteries (MIBs) were introduced as encouraging alternatives to Lithium-ion batteries. Following the successful synthesis of carbon nano-tube, its B and N doped derivatives which were doped with B and N enjoyed the attention of researchers as novel anode materials (AM) for MIBs. Here, we investigated a BC2N nano-tube (BC2NNT) as an encouraging AM for MIBs. To have a deeper understanding of the electrochemical properties, cycling stability, specific capacity (SC) and the adsorption behavior of this nano-tube, first-principles density functional theory computations were performed. By performing NMR calculations, we identified two types of non-aromatic hexagonal rings, namely B2C2N2 (I) and BC4N (II). Magnesium was adsorbed onto I with the adsorption energy of −40.38 kcal/mol and on II with the adsorption energy −20.15 kcal/mol. The SCs were as high as 783 mAh/g. The predicted average open-circuit voltage for BC2NNT was 1.94 V, which was greater than that of other 2D materials. The findings demonstrated the possibility of utilizing the BC2NNT as an AM for MIBs. The results can provide useful insights into the design of boron-carbon-nitrogen-based AMs for MIBs.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 06 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Impact of a Scenario-Based Learning Model in Mathematics Achievement and Mental Motivation for High School Students
...Show More Authors

Crossref (5)
Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Subsurface Water Retention a Technology for Increasing the Field Use Efficiency and Water Saving Values of Cucumber Plant
...Show More Authors

The technology of subsurface soil water retention (SWRT) uses a polyethylene ‎trough that is fixed under the root zone of the plant. It is a modern technology to increase the values of water ‎use efficiency, plant productivity and saving irrigation water by applying as little irrigation water ‎as possible. This study work aims at improving the crop yield and water use efficiency of a cucumber plant with less applied irrigation water by installing membrane trough below the soil surface. The field experiment was conducted in the Hawr Rajab District of ‎Baghdad Governorate in Winter 2018 for testing various trickle irrigation ‎systems. Two agricultural ‎treatment plots were utilized in a greenhouse for the compa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Engineering / University Of Baghdad
Subsurface Water Retention a Technology for Increasing the Field Use Efficiency and Water Saving Values of Cucumber Plant
...Show More Authors

The technology of subsurface soil water retention (SWRT) uses a polyethylene trough that is fixed under the root zone of the plant. It is a modern technology to increase the values of water use efficiency, plant productivity and saving irrigation water by applying as little irrigation water as possible. This study work aims at improving the crop yield and water use efficiency of a cucumber plant with less applied irrigation water by installing membrane trough below the soil surface. The field experiment was conducted in the Hawr Rajab District of Baghdad Governorate in Winter 2018 for testing various trickle irrigation systems. Two agricultural treatment plots were utilized in a greenhouse for the comparison. Plot T1 has used a subsurface t

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison of Parameters Estimation Methods for the Negative Binomial Regression Model under Multicollinearity Problem by Using Simulation
...Show More Authors

This study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Int. J. Mod. Eng. Res
Exact solutions for MHD flow of a viscoelastic fluid with the fractional Burgers’ model in an annular pipe
...Show More Authors

This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Microchemical Journal
A flow analysis system integrating an optoelectronic detector for the quantitative determination of active ingredients in pharmaceutical formulations
...Show More Authors

View Publication Preview PDF
Scopus (24)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Microchemical Journal
A flow analysis system integrating an optoelectronic detector for the quantitative determination of active ingredients in pharmaceutical formulations
...Show More Authors

Scopus (24)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref