Preferred Language
Articles
/
KhYh0ooBVTCNdQwCEKbc
Lattice Boltzmann method with moment-based boundary conditions for rarefied flow in the slip regime
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Oct 01 2012
Journal Name
Computers & Mathematics With Applications
Boundary element formulations for the numerical solution of two-dimensional diffusion problems with variable coefficients
...Show More Authors

View Publication
Crossref (23)
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Continuous Classical Boundary Optimal Control of Couple Nonlinear Hyperbolic Boundary Value Problem with Equality and Inequality Constraints
...Show More Authors

The paper is concerned with the state and proof of the existence theorem of a unique solution (state vector) of couple nonlinear hyperbolic equations (CNLHEQS) via the Galerkin method (GM) with the Aubin theorem. When the continuous classical boundary control vector (CCBCV) is known, the theorem of existence a CCBOCV with equality and inequality state vector constraints (EIESVC) is stated and proved, the existence theorem of a unique solution of the adjoint couple equations (ADCEQS) associated with the state equations is studied. The Frcéhet derivative derivation of the "Hamiltonian" is obtained. Finally the necessary theorem (necessary conditions "NCs") and the sufficient theorem (sufficient conditions" SCs") for optimality of the stat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Pharmaceutical Research
New method for the evaluation of propranolol with phosphotungstic acidvialong distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis
...Show More Authors

A new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Galvanic Corrosion of Carbon Steel -Stainless Steel Couple in Sulfuric Acid under Flow Conditions
...Show More Authors

Galvanic corrosion of stainless steel 316 (SS316) and carbon steel (CS) coupled in 5% wt/v sulfuric acid solution at agitation velocity was investigated. The galvanic behavior of coupled metals was also studied using zero resistance ammeter (ZRA) method. The effects of agitation velocity, temperature, and time on galvanic corrosion current and loss in weight of both metals in both free corrosion and galvanic corrosion were investigated. The trends of open circuit potential (OCP) of each metal and galvanic potential (Eg) of the couple were, also, determined. Results showed that SS316 was cathodic relative to CS in galvanic couple and its OCP was much more positive than that of CS for all investigated ranges of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (46)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Investigation of the Quadrupole Moment and Form Factors of Some Ca Isotopes: Quadrupole Moment
...Show More Authors

Nuclear shell model is adopted to calculate the electric quadrupole moments for some Calcium isotopes 20Ca (N = 21, 23, 25, and 27) in the fp shell. The wave function is generated using a two body effective interaction fpd6 and fp space model. The one body density matrix elements (OBDM) are calculated for these isotopes using the NuShellX@MSU code. The effect of the core-polarizations was taken through the theory microscopic by taking the set of the effective charges. The results for the quadrupole moments by using Bohr-Mottelson (B-M) effective charges are the best. The behavior of the form factors of some Calcium isotopes was studied by using Bohr-Mottelson (B-M) effective charges.

View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Potential and Current Distribution in Flow Through Porous Electrochemical Reactor Working under Limiting Current Conditions
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Apr 07 2009
Journal Name
The 6th Engineering Conference
Bond-Slip Relationship of Reinforcing Steel Bars Embedded in Concrete
...Show More Authors

An experimental investigation based on thirty three simple pullout cylinder specimens was conducted to study the bond-slip trend between concrete and steel reinforcement. Plain and deformed steel reinforcement bars were used in this investigation. The effect of bar diameter, concrete compressive strength and development length on bond-slip relation was detected. The results showed that the bond strength increases with increasing of compressive strength and with decreasing of bar diameter and development length. A nonlinear regression analysis for the experimental results yields in a mathematical correlation to predict the bond strength as a function of concrete compressive strength, reinforcing bar diameter and its yield stress. The minimum

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref