Preferred Language
Articles
/
omGOO5kBdMdGkNqj9iQN
ANALYSIS OF A MOLECULAR DYNAMICS SIMULATION OF THE ACETYLCHOLINESTERASE ENZYME AND ITS COMPLEX WITH (AXILLARIDINE-A) INHIBITOR
...Show More Authors

Molecular dynamics (MD) simulations were carried out in order to investigate the binding mode of axillaridine-A at the active site of human acetylcholinesterase (AChE) enzyme. 2.0 nanosecond of MD simulations was made for the protein and the complex to dynamically explore the active site and the behavior of the ligand at the peripheral AChE binding site. These calculations for the enzyme alone showed that the active site of AChE is located at the bottom of a deep and narrow cavity whose surface is lined with rings of aromatic residues and Tyr72 is almost perpendicular to the Trp286 ring and forms a stable - interaction. The size of the active site of the complex decreases with time due to increase the interaction. Axillaridine-A forms in addition to van der Waals interactions, stable - interaction with the aromatic ring of Tyr117 residue which is responsible for the inhibition of the catalytic activity of the enzyme. Finally because of the biological relevance of the target studied here, the present results can be of interest for the rational design of molecules potentially useful in the treatment of the Alzheimer's disease.

Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Fri Oct 10 2025
Journal Name
Journal Of Visualized Experiments
Explainable AI for Visual Inspection: A Comparative Analysis and Review
...Show More Authors

Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Molecular and Immunological Detection of Hepatitis C Virus in Patients with Chronic Renal Failure
...Show More Authors

Due to its association with hepatocellular carcinoma and being one of the ten most common malignancies worldwide, hepatitis C viral infection has become a severe public health concern. Therefore, establishing an accurate, reliable and sensitive diagnostic test for this infection is strongly advised. Real-time polymerase chain reaction (PCR) has been created to achieve this purpose. The current study was established to investigate the hepatitis C virus among Iraqi patients with chronic renal failure and to detect the virus immunologically by the fourth generation enzyme-linked immunosorbent assay technique and molecularly by real-time PCR. As a result, out of 50 patients with chronic renal failure undergoing dialysis, 39 patients tes

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Molecular study of the relationship of gene expression of some genes with the temperature variation of bacterial growth
...Show More Authors

Pseudomonas aeruginosa is an opportunistic pathogen responsible for serious infections. At least three different exopolysaccharides, alginate, polysaccharide synthesis locus (Psl), and pellicle exopolysaccharide (Pel) make up the biofilm matrix in P. aeruginosa . The effect of temperature on the biofilm formation and gene expression was examined by microtiter plate and real-time quantitative polymerase chain reaction (qRT-PCR). To be able to determine the effect of temperature on biofilm formation and gene expression of P. aeruginosa, 303 clinical and environmental samples were collected. Pseudomonas aeruginosa was isolated from 61 (20.1%) and 48 (15.8%) of the clinical and e

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Numerical Simulation of flow in pipe with cross jet effects
...Show More Authors

A numerical method is developed to obtain two-dimensional velocity and pressure distribution through a cylindrical pipe with cross jet flows. The method is based on solving partial differential equations for the conservation of mass and momentum by finite difference method to convert them into algebraic equations. This well-known problem is used to introduce the basic concepts of CFD including: the finite- difference mesh, the discrete nature of the numerical solution, and the dependence of the result on the mesh refinement. Staggered grid implementation of the numerical model is used. The set of algebraic equations is solved simultaneously by “SIMPLE” algorithm to obtain velocity and pressure distribution within a pipe. In order to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Saudi Med J
The frequency of 21-alpha hydroxylase enzyme deficiency and related sex hormones in Iraqi healthy male subjects versus patients with acne vulgaris
...Show More Authors

KE Sharquie, AA Noaimi, BO Saleh, ZN Anbar…, Saudi Med J, 2009 - Cited by 13

View Publication
Scopus (8)
Scopus
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
A Pragmatic Analysis of Personal Deixes in Lyrical Poetry: Ezra Pound's Lyrics "Girl" and "A Virginal": رماح محي مجيد
...Show More Authors

Deixes belong to the field of both semantics and  pragmatics as they lie in the edge of these two fields. Pragmatically, they are concerned with the relationship between the structure of a language and the contexts. The present work aims at analyzing the use of deixes using Levinson’s (1983) and Yule's (1996) concept of deixes, where the latter maintained that the referents of the deixes cannot be realized apart from the context where they are used. He added that the contextual information of certain utterances involves information about the participants (the speaker and the addressee), the time and the place. Consequently, a qualitative- descriptive approach has been adopted to meet the objective of the study which reads, “exam

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Al-adab Journal
A Pragmatic Analysis of Implicatures in Covid-19 Coronavirus English Jokes: A Neo-Gricean Approach
...Show More Authors

Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of the average sample size and defective ratio In a finite individualized inspection with a practical application
...Show More Authors

The purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.

The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.

View Publication Preview PDF
Crossref