Preferred Language
Articles
/
dxe2J44BVTCNdQwCfjtT
The Effect of Electric Stimulation Using Proposed Apparatus on Static Balance Through Hamstring Muscle Rehabilitating in Athletes Suffering from Mild Muscle Tear
...Show More Authors

KS Ismaeil, BR Jawad, Journal of Physical Education, 2023

View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Surfaces And Interfaces
Corrosion performance of electrospinning nanofiber ZnO-NiO-CuO/polycaprolactone coated on mild steel in acid solution
...Show More Authors

View Publication
Scopus (33)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Corrosion Rate Optimization of Mild-Steel under Different Cooling Tower Working Parameters Using Taguchi Design
...Show More Authors

This study investigates the implementation of Taguchi design in the estimation of minimum corrosion rate of mild-steel in cooling tower that uses saline solution of different concentration. The experiments were set on the basis of Taguchi’s L16 orthogonal array. The runs were carried out under different condition such as inlet concentration of saline solution, temperature, and flowrate. The Signal-to- Noise ratio and ANOVA analysis were used to define the impact of cooling tower working conditions on the corrosion rate. A regression had been modelled and optimized to identify the optimum level for the working parameters that had been founded to be 13%NaCl, 35ᴼC, and 1 l/min. Also a confirmation run to establish the p

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 18 2025
Journal Name
Journal Of Language Studies
Opening the Box of Suffering, Unleashing the Evils of the World’: Pandora and her Representation in Nineteenth-Century American Poetry
...Show More Authors

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Requirements for achieving financial balance in Iraq
...Show More Authors

The deficit of the federal budget and the structural imbalances suffered by the Iraqi economy has affected the direction of research towards suggesting steps and mechanisms can be relied upon in the near term to form a broader base of non-oil revenues aimed at achieving a balanced budget, and to proceed to reform the financial situation, In reducing their financial dictates, whether capital or operational, which lead to significant financial and economic consequences. This also requires that the Iraqi political elite have the real will, strategic vision and full awareness that the implementation of these reforms has potential social and economic effects, with long-term measures to be taken. The aim is not only to reform the finan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Study of the Electric Quadrupole Moments for some Scandium Isotopes Using Shell Model Calculations with Different Interactions
...Show More Authors

The electric quadrupole moments for some scandium isotopes (41, 43, 44, 45, 46, 47Sc) have been calculated using the shell model in the proton-neutron formalism. Excitations out of major shell model space were taken into account through a microscopic theory which is called core polarization effectives. The set of effective charges adopted in the theoretical calculations emerging about the core polarization effect. NushellX@MSU code was used to calculate one body density matrix (OBDM). The simple harmonic oscillator potential has been used to generate the single particle matrix elements. Our theoretical calculations for the quadrupole moments used the two types of effective interactions to obtain the best interaction compared with the exp

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Thu Nov 30 2023
Journal Name
Eximia
A treatment strategy for recurrent (ankle injuries) in Muay Thai athletes
...Show More Authors

Objective: An efficient solution for stabilization is the mobilization of the joints for the arthrokinematics affected by the positional defect of the CAI (i.e. chronic ankle instability). This study put to comparison the impacts of ankle dorsi flexion range of motion (DFROM) as well as dynamic balance ability (DBA) in the patients who have CAI using PJM (i.e. passive joint mobilization), a technique typically been used in previous works, and active joint mobilization (AJM), a technique which could have a greater impact on cortical excitability with the spontaneous movement. Design: rehabilitation program to treat recurrent ankle. Methods: A total of 10 players from the Iraqi clubs Muay Thai team were registered, 5 from each of

... Show More
View Publication
Crossref
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Study of Electric Quadrupole Transition (E2) in 56Ba and 62Sm Nuclei
...Show More Authors

Transition strengths ↓
2
. u . w
2) M(E for gamma transition from first excited 21
+
states to the
ground states that produced by pure electric quadrupole emission in even –even isotopes of
56Ba and 62Sm have been studied through half- lives time for 21
+
excited states with the
intensities of γ0- transitions measurements and calculated as a function of neutron number
(N). The results thus obtained have shown that; the nuclides with magic neutron number such
as 56Ba
138
and 62Sm
144
have minimum value for ↓
2
. u . w
2) M(E .

View Publication Preview PDF