Preferred Language
Articles
/
4BixdZQBVTCNdQwCjRhW
Photodetector based on Rutile and Anatase TiO<sub>2</sub> nanostructures/n-Si Heterojunction
...Show More Authors

Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction

Publication Date
Sun May 05 2024
Journal Name
Review Of Clinical Pharmacology And Pharmacokinetics - International Edition
Cytotoxic effects of the Crassula ovata n-hexane fraction on human esophagus cancer KYSE-30 cells
...Show More Authors

The current study shows the cytotoxicity effect of the Crassula ovata n-hexane extract on esophagus can¬cer. C. ovata is a perennial succulent plant belonging to the Crassulaceae family. In Africa, the leaves were used medicinally to cure epilepsy and diarrhoea by boiling them in milk. The hexane fraction, which is obtained through the maceration method, demonstrates the presence of many compounds that have an anticancer effect, which are ob¬tained by gas chromatography - mass spectroscopy. The phytosterol compound was isolated by a preparative thin layer chromato¬graph and was identified by liquid chromatography - mass spectroscopy. The hexane fraction was found to possess a strong anticancer effect against esophagus cancer. The

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Research Journal Of Chemistry And Environment
Synthesis and Characterization of New Complexes of 2- (Benzo[d]Thiazol-2-ylAmino)-2-(5-Chloro-2-Hydroxy Phenyl) Acetonitrile Ligand with Some Divalent Transition Metal Ions
...Show More Authors

A series of metal ion complexes of some divalent transition metal ions having the general composition [ML2Cl2]nH2O with 2-(benzo[d]thiazol-2-ylamino)-2- (5-chloro-2-hydroxy phenyl) acetonitrile ligand has been prepared from 5-chloro-2-hydroxy-benzaldehyde and benzo[d]thiazol-2-amine. Existence of cyanide as potassium cyanide in acidic medium was considered, characterized by elemental chemical analysis, conductance of molarity, magnetic susceptibility measurements, FTIR electronic spectral studies and mole ratio method. FTIR indicates the participation of amino and acetonitrile nitrogen which is coordinated with the central metal ion.

Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Synthesis,Structural and Biological studies of 4-[(1-phenyl-2,3-dimethyl-3-pyrozoline-5-one)azo]-N,N-dimethyl anline with some transition metal ions
...Show More Authors

The present work includes the preparation and characterization of{Co(II) , Ni(II), Pd(II), Fe(III) , Ru(III),Rh(III), Os(III) , Ir(III) , Pt(IV) and VO(IV)}complexes of a new ligand 4-[(1-phenyl-2,3-dimethyl-3-pyrozoline-5-one)azo]-N,N-dimethylanline (PAD). The product (PAD) was isolated,studies and characterized by phsical measurements,i.e., (FT-IR), (UV) Spectroscopy and elemental analysis(C.H.N). The prepared complexes were identified and their structural geometric were suggested in solid state by using flame atomic absorption, elemental analysis(C.H.N), (FT-IR) and (UV-Vis) Spectroscopy, as well as magnetic susceptibility and conductivity measurements . The study of the nature of the complexes formed in( ethanolic solution) following t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref