Preferred Language
Articles
/
bsj-5920
Approximate Analytical Solutions of Bright Optical Soliton for Nonlinear Schrödinger Equation of Power Law Nonlinearity
...Show More Authors

This paper introduces the Multistep Modified Reduced Differential Transform Method (MMRDTM). It is applied to approximate the solution for Nonlinear Schrodinger Equations (NLSEs) of power law nonlinearity. The proposed method has some advantages. An analytical approximation can be generated in a fast converging series by applying the proposed approach. On top of that, the number of computed terms is also significantly reduced. Compared to the RDTM, the nonlinear term in this method is replaced by related Adomian polynomials prior to the implementation of a multistep approach. As a consequence, only a smaller number of NLSE computed terms are required in the attained approximation. Moreover, the approximation also converges rapidly over a wide time frame. Two examples are provided for showing the ability and advantages of the proposed method to approximate the solution of the power law nonlinearity of NLSEs. For pictorial representation, graphical inputs are included to represent the solution and show the precision as well as the validity of the MMRDTM.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antibacterial Activities of Ligand Type N2O4 Schiff base and its Novel Complexes with Co(II), Ni(II), Cu(II) and Zn(II) ions.
...Show More Authors

The reaction of 2-amino benzoic acid with 1,2-dichloroethane under reflux in methanol and KOH as a base to gave the precursor [H4L]. The precursor under reflux and drops of CH3COOH which reacted with (2mole) from salicycaldehyde in methanol to gave a new type N2O4 ligand [H2L], this ligand was reacted with (MCl2) Where [M= Co (II), Ni(II), Cu(II) and Zn(II)] in (1:1) ratio at reflux in methanol using KOH as a base, to give complexes of the general formula [M(L)]. All compounds have been characterized by spectroscopic methods [1H NMR ( just to the ligand), FTIR, uv-vis, atomic absorption], melting point, conductivity, chloride content, as well as m

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Molecular Structure
Synthesis, spectral studies, DFT, biological evaluation, molecular docking and dyeing performance of 1-(4-((2-amino-5-methoxy)diazenyl)phenyl) ethanone complexes with some metallic ions
...Show More Authors

Scopus (60)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Thu Nov 27 2025
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
Synthesis, characterization, dyeing performance, and microbial evaluation of 5-((2,4-dibromo-6-((cyclohexyl(methyl)amino) methyl)phenyl)diazenyl)quinolin-8-ol complexes with some metallic ions
...Show More Authors

5-((2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)phenyl)diazenyl)quinolin-8-ol azo ligand (L) has been synthesized through the reaction of diazonium salt for 2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)aniline with 8-hydroxyquinoline. The azo ligand (L) was characterized utilizing spectroscopic techniques, including FTIR, UV-Vis, 1H and 13C NMR, as well as mass spectrometry and micro-elemental analysis (C.H.N). Metal complexes containing Co(II), Ni(II), Cu(II), and Zn(II) were synthesized and analyzed through mass spectrometry, flame atomic absorption, elemental analysis (C.H.N), infrared and UV-Vis spectroscopy, along with measurements of conductivity and magnetic properties. The experimental findings suggested that all met

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Dissemination of Multidrug Resistance (MDR) and Extensively Drug Resistant (XDR) among Uropathogenic E. coli (UPEC) Isolates from Urinary Tract Infection Patients in Babylon Province, Iraq
...Show More Authors

Antibiotic resistance is a problem of deep scientific concern both in hospital and community settings. Rapid detection in clinical laboratories is essential for the judicious recognition of antimicrobial resistant organisms. So, the growth of Uropathgenic Escherichia coli (UPEC) isolates with Multidrug-resistant (MDR) and Extensively Drug-resistant (XDR) profiles that thwart therapy for (UTIs) has been detected and has straight squeezed costs and extended hospital stays. This study aims to detect MDR- and XDR-UPEC isolates. Out of 42 UPEC clinical isolates were composed from UTI patients. The bacterial strains were recognized by standard laboratory protocols. Susceptibility to antibiotic was measured by the standard disk diffusi

... Show More
View Publication Preview PDF
Crossref (8)
Clarivate Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Sub–Nyquist Frequency Efficient Audio Compression
...Show More Authors

This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 14 2020
Journal Name
Progress In Industrial Ecology, An International Journal
3D image reconstruction from its 2D projection - a simulation study
...Show More Authors

A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref