Preferred Language
Articles
/
bsj-8271
A Kinetic Study on Microwave- assisted Extraction of Bioactive Compounds from Rosmarinus Officinalis L
...Show More Authors

Due to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves.  The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five  kinetic models, the Hyperbolic diffusion model,  Power low model, the First order reaction  model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The results of extracts showed that the best conditions are: the solvent is ethyl alcohol 80%, the capacity is 720W, and time is 6.5 min. For the kinetic study, all the studied models were appropriate to the applied extraction tip with high correlation coefficients, therefore, the kinetic constants of all these models were determined.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (259)
Crossref (195)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Mar 07 2026
Journal Name
Al–bahith Al–a'alami
Effectiveness of Dialogic Communication in Online Public Relations with an Audience : (Analytical Study of the Websites of Universities in UAE)
...Show More Authors

The Study addressed the effectiveness of dialogic communication in online public relations with an audience of higher education institutions in the United Arab Emirates. The study aimed to know about the interest extent of higher education institutions through their websites with the elements of dialogic communication in online public relations to communicate with their audience. The researcher used survey methodology and content Analysis tool as an essential tool for collecting information. Some of the important results of the study are: The websites of higher education institutions in terms of indicators of ease of use; the main links on the websites are clearly available on the opening page, there is a map on the websites, reduce depe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 11 2023
Journal Name
College Of Islamic Sciences
Collision in the dispute between the two imams Shafi’i and Abu Hanifa by Sheikh Mansour bin Muhammad bin Abd al-Jabbar al-Marwazi al-Samani Abi al-Muzaffar (d. 498 AH) from the issue (If one of the Muslim spouses apostatized and one of the infidel spouses
...Show More Authors

The science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Pharmacokinetic Consideration to Formulate Sustained Release Drugs: Understanding the Controlled Drug Diffusion through the Body Compartment of the Systemic Circulation and Tissue Medium-A Caputo Model
...Show More Authors

The aim of this study is to provide an overview of various models to study drug diffusion for a sustained period into and within the human body. Emphasized the mathematical compartment models using fractional derivative (Caputo model) approach to investigate the change in sustained drug concentration in different compartments of the human body system through the oral route or the intravenous route. Law of mass action, first-order kinetics, and Fick's perfusion principle were used to develop mathematical compartment models representing sustained drug diffusion throughout the human body. To adequately predict the sustained drug diffusion into various compartments of the human body, consider fractional derivative (Caputo model) to investiga

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Person-Organization's Environment Fit and it's Reflection on the Work Outcomes
...Show More Authors

This study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational  citizenship behavior ).

The questionnair’e has been used as a basic  instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 02 2009
Journal Name
Journal Of Educational And Psychological Researches
صعوبات تدريس مادة التاريخ الأوربي لمرحلة الخامس الأدبي دراسة تطبيقية من وجه نظر المدرسين
...Show More Authors

اهمية البحث :

أصبح التغير المتسارع في جميع مجالات الحياة يمثل السمة المميزة لعصرنا الحالي ونتيجة التغير فقد برزت الحاجة إلى تطوير برامج المؤسسات التربوية والتعليمية لكي تواكب تلك التغيرات خاصة وان الصيحات تعالت من هنا وهناك لا عادة النظر في العلمية التربوية ومحتواها وأهدافها ووسائلها بما يتح للمتعلم الاستفادة القصوى من الوسائل والأدوات التعليمية في رفع مستوى تحصيله الدارس واكت

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دراسة حصانة مقدرات بيز التجريبي (الخبري) Empirical Bayse لنماذج الانحدار الذاتي من الدرجة الأولى
...Show More Authors

  Estimation stage is one of most important in process of selecting and identification for fit model, this model gives a best results if the good methods of estimation are depended on, one of those methods is Bayes method for estimation the parameters, it puts an assumption that parameter have a distribution.

 This paper studies the robustness of estimators of empirical Bayes to know the properties of those estimators.

    

 

 

 

View Publication Preview PDF
Crossref