Preferred Language
Articles
/
bsj-820
Interactions of some metal ions with Nitrogenous bases present in Nucleotides
...Show More Authors

Acidity constants at 30co and 0.125 ionic strength have been determined for the Nitrogous bases of nucleic acid; cytocine, uarcil and thymine, and found to be 3.55 x10-19 , 1.44 x10 -19 and 7.24 x10 -20 respectively. Stability constants of these bases with Thorium and uranyl ions have been determined. Results showed that metal ions Thorium and uranyl ions behave as hard acids and the nitrogenum bases behave as Hard bases according to Pearson's definition .Hardness – softness parameters for these ligands were calculated ,stability constants of complexes with metal ions could be arranged as follows :- Cytosine > Uracil > Thymine .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Fme Transactions
Unsteady nonlinear panel method with mixed boundary conditions
...Show More Authors

A new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Wed Mar 04 2026
Journal Name
Iraqi Journal Of Mechanical And Material Engineering
WAKE ROLL-UP BEHIND WINGS WITH GROUND EFFECT
...Show More Authors

A numerical method for the calculation of the three-dimensional wake rollup behind symmetric wings with ground effect and its aerodynamic characteristics for steady low subsonic flow have been developed. A non-planar quadrilateral vortex-ring method with vortex wake relaxation iterative scheme for lifting surfaces is obtained. A computer program was build to treat wings with breaks, span wise trailing edge flaps, local dihedral angle, camber, twist and ground effect. Forces and moments are obtained from vector product of local velocity and vortex strength multiplied by density. The program has been validated for a number of configurations for which experimental data is available. Good agreement has been obtained for these configurations. Al

... Show More
View Publication
Publication Date
Fri Aug 01 2014
Journal Name
International J. Of Math. Sci. & Engg. Appls.
NEUTRAL DELAY DIFFERENTIAL EQUATION WITH ONE LARGE DELAY
...Show More Authors

Publication Date
Sat May 28 2022
Journal Name
Abstract And Applied Analysis
Discretization Fractional-Order Biological Model with Optimal Harvesting
...Show More Authors

In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Craniofacial Surgery
Inferior Alveolar Nerve Injuries Associated With Mandibular Fractures
...Show More Authors

The study evaluates the incidence of inferior alveolar nerve injuries in mandibular fractures, the duration of their recovery, and the factors associated with them. Fifty-two patients with mandibular fractures involving the ramus, angle, and body regions were included in this study; the inferior alveolar nerve was examined for neurological deficit posttraumatically using sharp/blunt differentiation method, and during the follow-up period the progression of neural recovery was assessed. The incidence of neural injury of the inferior alveolar nerve was 42.3%, comminuted and displaced linear fractures were associated with higher incidence of inferior alveolar nerve injury and prolonged recovery time, and recovery of inferior alveolar nerve fun

... Show More
View Publication
Scopus (18)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Craniofacial Surgery
Is Orbital Floor Reconstruction With Titanium Mesh Safe?
...Show More Authors

View Publication
Scopus (12)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Mar 18 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Detecting Deepfakes with Deep Learning and Gabor Filters
...Show More Authors

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Food Science And Technology
Analyzing food production risk with Monte Carlo simulation
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref