Preferred Language
Articles
/
eRZEx4sBVTCNdQwCyd7C
Synthesis, characterization, structural, thermal, POM, studies, antimicrobial, and DNA cleavage activity of a new schiff base-azo lighand and its complexation with selected metal ions
...Show More Authors

RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2

View Publication
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Integral transforms defined by a new fractional class of analytic function in a complex Banach space
...Show More Authors
Abstract<p>In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Mar 30 2006
Journal Name
College Of Islamic Sciences
Sections of monotheism and its types according to Sufism
...Show More Authors

Praise be to God, Lord of the Worlds, who has made His way for His servants who know in the depths and who are devoted to Him at all times and times, so He has delivered to Himself their pain from two exiles, and His prayers and peace are the perfect trust in the presence of the pearl of charity of existence. Possessor of great intercession and praiseworthy status until the day of meeting and eternity, and upon his family and companions, the people of tomorrow, steadfastness, generosity, and generosity, and after that

For a long period of time, I have been asking myself: Why did he attack so many contemporary books, especially Sufism? Why this unlimited financial expenditure on printing, binding, beautifying and enticing readers?

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Agriculture And Biology
Molecular Characterization of a Leaf Curl Disease Infecting Zucchini Squash in Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iraqi Journal Of Applied Physics
Structural and Morphological Characteristics of PEKK-Coated Titanium Disks by RF Magnetron Sputtering for Implant Osteointegration Application
...Show More Authors

Pure grade II titanium disks were coated with a thin coating of polyetherketoneketone (PEKK) polymer by RF magnetron sputtering using either nitrogen or argon gas. Sputtering technique was employed at 50 W for one hour at 60°C with continuous flow of nitrogen or argon gas. Field-emission scanning electron microscopy (FE-SEM) showed a continuous, homogeneous, rough PEKK surface coating without cracks. In addition, cross-sectional FE-SEM revealed an average coat thickness of 1.86 μm with argon gas and 1.96 μm with nitrogen gas. There was homogenous adhesion between the coating layer and substrate. The elemental analysis of titanium substrate revealed the presence of carbon, titanium, and oxygen. The RF magnetron sputtering with argon or ni

... Show More
Preview PDF
Publication Date
Thu Jun 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
In silico, In vitro studies of Anti-Oxidant and Anthelminthic Abilities of Phytoconstituents from Rhynchosia cana (Wild.) DC.
...Show More Authors

Helminthiasis is a significant economic burden on grazing cattle. Increased resistance to currently available synthetic anthelmintics used to treat helminthiasis, and anthelmintic residues in meat and dairy products pose a significant worldwide health threat. These obstacles require the development of new anthelmintics capable of combating drug resistance while also exhibiting improved safety profiles. Rhynchosia cana (Fabaceae) is a herb that has historically been used as a worm expeller. To evaluate the phytochemical profile and explore the anti-oxidant and anthelmintic effects of different extracts of Rhynchosia cana (R. cana) by In silico and In vitro methods. Using standardised chemical t

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 17 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Plasma Treatment on Shear Bond Strength of High Impact Acrylic Resin Denture Base Lined with Two Types of Soft Lining Materials after Immersion in Distilled Water and Denture Cleanser
...Show More Authors

Background: In dentistry, dentist takes the advantages of soft lining materials due to the viscoelastic properties. The major problem is the adhesion of the soft liner with the denture base material. Materials and Methods: Heat cured of high impact acrylic resin specimens prepared with dimensions 75x13x13mm for shear bond strength test, soft lining material (Refit and Mollosil) with a 3-mm thickness and used to join each two acrylic blocks. Also four specimens with the same previous dimensions utilized for chemical and physical surface analysis. The specimens grouped as control (without plasma) and experiment (with oxygen plasma) treated high impact acrylic specimens. Results: Plasma treatment increased the shear bond strength for both Refi

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref