Preferred Language
Articles
/
qBbelowBVTCNdQwCOP29
Novel Thermodynamic Properties of Binary Mixtures of Tetrahydrofurfuryl Alcohol wiyh some Alcohols At 298.15 K
...Show More Authors

Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

View Publication
Crossref (40)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

Crossref (40)
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 06 2009
Journal Name
مجلة ديالى للعلوم الانسانية
Synthesis and Characterization of Novel Bidentate Ligand type NO and Its Complexes with (CoII , NiII ,CuII and ZnII)
...Show More Authors

The [2-aminobenzothiazole]was reacted with [2,4,6 triyhydroxy-acetophenon monohydrate] to give a new ligand [2-N-2,4,6-trihydroxyacetophenonyliden benzothiazole] [H3L]. This ligand was reacted with metal ions ( CoII, NiII,CuII and ZnII) in methanol as solvent with ( 1:2 ) metal : ligand ratio to give a series of new complexes with general formula [ M(H2L)2],(where:M= CoII, NiII ,CuIIand, ZnII).All compounds were characterized by spectroscopic methods ( I.R , U.V – vis,HPLC) atomic absorption, along with chloride content and conductivity measurements. According to the data of these measurements we suggested a tetrahedral

Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Antibacterial and cytotoxic effect of a novel bio-logical Nano-silver fluoride synthesized from moringa oleifera leaf extract
...Show More Authors

Background: A great dental and biomedical interest had been paid to silver nanoparticles because of their antimicrobial activity. Objective: To evaluate the antimicrobial and cytotoxic activity of a newly developed Nano-silver fluoride that was synthesized from moringa oleifera leaf extract against S. mutants.  Material and method: The green synthesis method was used to prepare Nano-silver fluoride from moringa oleifera leaf extract. The minimum inhibitory concentration and the minimum bactericidal concentration were evaluated using brain heart infusion plates, while the cytotoxicity was evaluated by the hemolytic activity. Results: Nano-silver fluoride had a bactericidal and bacteriostatic effect (MIC was 60 ppm a

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 04 2021
Journal Name
International Journal Of Development In Social Science And Humanities
Dominant Ideology in Orwell’s Novel “Animal Farm”: A Critical Discourse Analysis of Selected Extracts
...Show More Authors

MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication