Preferred Language
Articles
/
vhay9ooBVTCNdQwC8MV8
Nickel removal from simulated wastewater using a novel bio-electrochemical cell with packed bed rotating cylinder cathode
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Natural Science Research
Sialic Acid Is A Novel Biochemical Marker In Sera Of Iraqi Endometriotic Patients
...Show More Authors

ABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 26 2021
Journal Name
Life-cycle Civil Engineering: Innovation, Theory And Practice
Shear performance of a novel demountable connector for reusable steel-concrete composite structures
...Show More Authors

A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Improvement the Superconducting properties of TlBa2 Ca2 Cu3xNix O 9-δ superconducting compound by partial substitution of copper with nickel oxide on the
...Show More Authors

View Publication
Scopus (21)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Apr 16 2017
Journal Name
Tikrit Journal For Dental Sciences
Evaluation of Apical Transportation and Curve Straightening of Curved Root Canals after Preparation with Different Nickel - Titanium Rotary Systems (Comparative in Vitro Study)
...Show More Authors

The goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Route Educational And Social Science Journal
THE PARADOX OF A POSTMODERN TECHNOLOGY IN SARAH RUHL’S DEAD MAN’S CELL PHONE
...Show More Authors

View Publication
Crossref