Preferred Language
Articles
/
bsj-1038
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 06 2025
Journal Name
Plasmonics
Removal of Mercury Hg(II) from Industrial Wastewater by Formation of TiO₂@Ag/HNT Nanocomposite Using Bio-microwaved Synthesized TiO₂@Ag NPs (Core Shell)
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Oct 15 2005
Journal Name
Journal Of Palestine Ahliya University For Research And Studies
Digital Stress Among University Students in Light of Certain Variables
...Show More Authors

This study aimed to measure digital stress among students at the University of Baghdad and to identify differences in digital stress based on gender (male–female), academic level (first–fourth year), and field of study (scientific–humanities). The study sample consisted of 200 students from the University of Baghdad. The "Digital Stress" scale, developed by the researcher specifically for this study, was applied, and the descriptive-analytical method was adopted. After administering the scale and analyzing the results using appropriate statistical methods, the findings indicated that university students experience a high level of digital stress, while no statistically significant differences were found in digital stress accord

... Show More
View Publication
Crossref
Publication Date
Sun May 16 2021
Journal Name
Graphs And Combinatorics
Commuting Involution Graphs for Certain Exceptional Groups of Lie Type
...Show More Authors
Abstract<p>Suppose that <italic>G</italic> is a finite group and <italic>X</italic> is a <italic>G</italic>-conjugacy classes of involutions. The commuting involution graph <inline-formula><alternatives><tex-math>$${\mathcal {C}}(G,X)$$</tex-math><math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mrow> <mi>C</mi> <mo>(</mo> <mi>G</mi> <mo>,</mo> <mi>X</mi> <mo>)</mo> </mrow> </math></alternatives></inline-formula> is</p> ... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Evaluation of Certain Physiological Biomarkers in Iraqi Endometrial Carcinoma Patients
...Show More Authors

Background: Endometrial Cancer (EC) is the malignant tumor originating from endometrium cell (lining of the uterus). EC incidence and mortality have increased in recent years. Routinely used methods for EC diagnosis and treatment are histopathological tissue culture after surgery and postoperative radiotherapy, however there is still not enough efficient treatment for recurrence or progression of this disease. So, there is a critical need for further EC identification by new biological ways for the prognostic diagnosis of it. Objective: This study aimed to look for ways by which could help in diagnosis of EC before the hysterectomy. Materials and Methods: 55 patients with EC and 57 healthy women were involved in this study (up to 45 years)

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Spectrophotometric method for the determination of Captopril in pharmaceutical formulations
...Show More Authors

A simple, rapid and sensitive spectrophotometric method has been developed for the determination of captopril in aqueous solution. The method is based on reaction of captopril with 2,3-dichloro 1,4- naphthoquinon(Dichlone) in neutral medium to form a stable yellow colored product which shows maximum absorption at 347 nm with molar absorptivity of 5.6 ×103 L.mole-1. cm-1. The proposed method is applied successfully for determination of captopril in commercial pharmaceutical tablets.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Spectrofluorimetric method for the determination of glibenclamide in pharmaceutical formulations
...Show More Authors

A sensitive spectrofluorimetric method for the determination of glibenclamide in its tablet formulations has been proposed. The method is based on the dissolving of glibenclamide in absolute ethanol and measuring the native fluorescence at 354 nm after excitation at 302 nm. Beers law is obeyed in the concentration of 1.4 to 10 µg.ml-1 of glibenclamide with a limit of detection (LD) of 0.067 µg.ml-1 and a standard deviation of 0.614. The range percent recoveries (N=3) is 94 - 103.

View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref