Preferred Language
Articles
/
-Ba1jooBVTCNdQwChJ4N
Estimation of Excess Properties of Binary Liquids Systems of Tetrahydrofurfuryl Alcohol with Short-Chain Carboxylic Acids at 298.15 K
...Show More Authors

At the temperature 298.15 K, some physical properties such as: refractive indices (nD), viscosities (η) and densities (ρ) were studied in four liquid-liquid mixtures: carboxylic acids (HCOOH, CH3COOH, CH3CH2COOH and CH3CH2CH2COOH) with tetrahydrofurfuryl alcohol (THFA) with the identified configuration set. These empirical data were utilized to estimate the excess molar volumes (Vm E), refractive index perversions (ΔR), viscosity deviations (ηE) and excess molar Gibbs free energy (ΔG*E). Values of Vm E, ηE , ΔG*E and ΔR were plotted versus mole fraction of tetrahydrofurfuryl alcohol. In all cases, the values of Vm E, ηE , ΔG*E and ΔR that obtained in this study were found to be negative at 298.15 K. The excess parameters were applied in the Redlich-Kister equation by utilizing multi-parameter coefficients that concluded binary coefficients and in respect to the standard deviation. The difference of these characteristics with the formation of binary liquid systems indicates the absence of bipolar bond, variation in the shape and size of component molecules, hydrogen bonding and dipolar interaction among unlike molecules.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Digital Literacy at The University
...Show More Authors

The revolution of technology in the 21st century has changed radically the
climate of opinion concerning second language education. In order to excel in
today’s world, teachers and learners need to adopt new roles and be equipped with
new skills and competencies that go beyond the basic ones of listening, speaking,
reading, and writing; skills that cannot be gained if teachers teach mere academic
subjects, and students are evaluated on how well they have learnt the minute sub
skills in those content areas.
This session will touch upon several skills which may be considered the
new basics of the 21st century. Among these skills are: autonomy, active learning,
critical thinking, cooperative learning, and digita

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Education For Women
Knowledge Management at Kindergartens Managers
...Show More Authors

The task of an educational institution such as kindergartens need to run by managers possess the knowledge to manage the administration of the importance in the development of kindergarten has been the goal of research to identify knowledge management at Riyadh managers, and achieve the objectives of Search selected sample of directors of kindergartens in the city of Baghdad was (160) director was Akhtarhn simple random way, been building measure for knowledge management and presented to the group of experts and extracted stability in a way re-testing and Alvakronbach and reach search to a discrepancy between managers Riyadh in knowledge management and put the researcher set of recommendations including the establishment of seminars and

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 21 2022
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Nanotechnology at the Molecular Level
...Show More Authors

Materials with external dimensions of one or more nanometers are referred to as nanomaterials. These structures result from a number of manufacturing processes. They are used in many industries, including pharmaceuticals, which is the most significant one. Numerous variables, including size, shape, surface morphology, crystallinity, solubility, etc., affect physical properties. While new physical and chemical processes are being created constantly, the biological method is the ideal strategy for synthesizing nanoparticles since it is straightforward, safe, and economical. Different kinds of nanoparticles can be metabolically synthesized by a wide variety of biological sources, including plants, bacteria, fungi, and yeast. There are

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Cutaneous leishmaniasis at Wasit governorate
...Show More Authors

The study included identification of Leishmania parasites from cases of cutaneous leishmaniasis, by examination of smears for LD bodies , isolation of parasites by culture in media , and characterisation of the isolated parasites by Isoenzyme analysis.Out of 100 cases suspected for cutaneous leishmaniasis ; 85 were diagnosed on culture for Leishmania promastigotes and this method was found to be superior to direct microscopy for amastgotes (LD bodies) .The cases included in this study belonged to different areas of Wasit/Iraq. There were 30 cases from Hay, 35 from Badra, and 35 cases from Suwaira.The distribution of infection in different age groups indi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Applied System Innovation
Earthquake Hazard Mitigation for Uncertain Building Systems Based on Adaptive Synergetic Control
...Show More Authors

This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 05 2010
Journal Name
Etri Journal
MC-MIPOG: A Parallel t-Way Test Generation Strategy for Multicore Systems
...Show More Authors

View Publication
Scopus (43)
Crossref (27)
Scopus Clarivate Crossref