Preferred Language
Articles
/
OxeHP48BVTCNdQwCfWa0
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Fabrication of PbxS1-x Detector and Studying the Effect of x Content on its some Physical Properties
...Show More Authors

A polycrystalline PbxS1-x alloys with various Pb content ( 0.54 and 0.55) has been prepared successfully. The structure and composition of alloys are determined by X-ray diffraction (XRD), atomic absorption spectroscopy (AAS) and X-ray fluorescence (XRF) respectively. The X-ray diffraction results shows that the structure is polycrystalline with cubic structure, and there are strong peaks at the direction (200) and (111), the grain size varies between 20 and 82 nm. From AAS and XRF result, the concentrations of Pb content for these alloys were determined. The results show high accuracy and very close to the theoretical values. A photoconductive detector as a bulk has been fabricated by taking pieces of prepared alloys and polished chemic

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 16 2024
Journal Name
International Development Planning Review
THE EFFECT OF THE IMPERATIVE METHOD IN TEACHING PHYSICAL EDUCATION CURRICULA FOR THE PRIMARY STAGE
...Show More Authors

Y Adnan, H Atiyah, IH Neamah…, International Development Planning Review, 2024

View Publication Preview PDF
Publication Date
Fri Oct 14 2022
Journal Name
Diagnostics
Determination of the Accuracy of Salivary Biomarkers for Periodontal Diagnosis
...Show More Authors

Background: We aimed to investigate the accuracy of salivary matrix metalloproteinases (MMP)-8 and -9, and tissue inhibitor of metalloproteinase (TIMP)-1 in diagnosing periodontitis and in distinguishing periodontitis stages (S)1 to S3. Methods: This study was a case–control study that included patients with periodontitis S1 to S3 and subjects with healthy periodontia (controls). Saliva was collected, and then, clinical parameters were recorded, including plaque index, bleeding on probing, probing pocket depth, and clinical attachment level. Diagnosis was confirmed by assessing the alveolar bone level using radiography. Salivary biomarkers were assayed using an enzyme-linked immunosorbent assay. Results: A total of 45 patients (15

... Show More
View Publication
Scopus (24)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jul 12 2024
Journal Name
World Water Policy
The effect of natural factors on changing soil uses in the marshes: An experimental study using Landsat satellite data
...Show More Authors

The study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (19)
Crossref (12)
Scopus Crossref