Preferred Language
Articles
/
nxYCAYgBVTCNdQwCmXJo
Detection of nitrotyrosine (Alzheimer's agent) by B24N24 nano cluster: A comparative DFT and QTAIM insight
...Show More Authors

A nano-sensor for nitrotyrosine (NT) molecule was found by studying the interactions of NT molecule with new B24N24 nanocages. It was calculated using density functionals in this case. The predicted adsorption mechanisms included physical and chemical adsorption with the adsorption energy of −2.76 to −4.60 and −11.28 to −15.65 kcal mol−1, respectively. The findings show that an NT molecule greatly increases the electrical conductivity of a nanocage by creating electronic noise. Moreover, NT adsorption in the most stable complexes significantly affects the Fermi level and the work function. This means the B24N24 nanocage can detect NT as a Φ–type sensor. The recovery time was determined to be 0.3 s. The sensitivity of pure BN nanocages could be improved without additional expensive structural manipulations. After the NT had been absorbed into the nanocage, UV–Vis spectrum analysis revealed that the transmission wavelength shifted significantly toward 390.07 nm. Hence, a redshift occurs when the NT molecule gets near the B24N24 nanocage. According to the present study model, B24N24 nanocages are possibly promising devices for NT sensors based on their electronic and structural properties.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Conference Proceedings Of The Society For Experimental Mechanics Series
A comparative study of mode decomposition to relate next-ERA, PCA, and ICA modes
...Show More Authors

This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using

... Show More
Scopus (1)
Scopus
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Comparative Biochemical Study of Proteins Profile in Iraqi Children and Adolescent with ?-Thalassemia
...Show More Authors

The aim of the present research is to study different protein fractions in sera of children and adolescent with  β –thalassemia major and minor and to compare the results with that of healthy control.One hundred fifty children and adolescents were enrolled in this study,including 50 patients with β- thalassemia major , 50 patients with  β- thalassemia minor as pathological control group and another apparently 50 healthy individuals as a control group. The age of all studied  groups ranged from (4-18)years.Total protein, albumin and immunoglobulins were estimated in sera of all subjects.  A Significant  decrease  was  found  in  the  total  protein and  albumin&nb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Physics: Conference Series
A comparative Analytical Investigation of Different Geomagnetic Storms During Solar Cycles 23 and 24
...Show More Authors
Abstract<p>In this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 04 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
A comparative immunohistochemical expression of cytokeratin 19 in odontogenic keratocyst, dentigerous, and radicular cysts
...Show More Authors

Background: Odontogenic cysts are characterized by their sluggish growth and ability to enlarge, primarily affecting the oral and maxillofacial tissues. Timely diagnosis and treatment are crucial to prevent potentially serious consequences. The present study aimed to evaluate and compare the immunohistochemical expression of cytokeratin 19 in the epithelium of odontogenic keratocyst, dentigerous, and radicular cysts.

Methods: This study analyzed forty-five formalin-fixed, paraffin-embedded tissue blocks containing odontogenic cysts. The sample consisted of fifteen odontogenic keratocysts, fifteen dentigerous cysts, and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Non-traded Tales in Imami and Hanafi Doctrines (A Comparative Study of Religion Fundamentals)
...Show More Authors

 

The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study for Estimate Fractional Parameter of ARFIMA Model
...Show More Authors

      Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Preparation and Study of morphological properties of ZnO nano Powder
...Show More Authors

In this work, ZnO nanostructures for powder ZnO were synthesized by Hydrothermal Method. Size and shape of ZnO nanostructureas can be controlled by change ammonia concentration. In the preparation of ZnO nanostructure, zinc nitrate hexahydrate [Zn(NO3)2·6H2O] was used as a precursor. The structure and morphology of ZnO nanostructure have been characterized by scanning electron microscopy (SEM), atomic force microscopy (AFM), X-ray diffraction (XRD). The synthesized ZnO nanostructures have a hexagonal wurtzite structure. Also using Zeta potential and Particle Size Analyzers and size distribution of the ZnO powder

 

View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Forecasting Credit Losses in A Sample of Iraqi Banks - A Comparative Analysis
...Show More Authors

  The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref