Preferred Language
Articles
/
ijp-206
Effect of laser energy and pulses on size and concentration of gold nanoparticles in DDDW by LALP method
...Show More Authors

The size and the concentration of the gold nanoparticles (GNPs)
synthesized in double distilled deionized water (DDDW) have been
found to be affected by the laser energy and the number of pulses.
The absorption spectra of the nanoparticles DDDW, and the
surface plasmon resonance (SPR) peaks were measured, and found to
be located between (509 and 524)nm using the UV- Vis
spectrophotometer. SPR calculations, images of transmission
electron microscope, and dynamic light scattering (DLS) method
were used to determine the size of GNPs, which found to be ranged
between (3.5 and 27) nm. The concentrations of GNPs in colloidal
solutions found to be ranged between (37 and 142) ppm, and
measured by atomic absorption spectroscopy (AAS).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
The Estimation of Vibrational Energy of Two Coupled (Welded) Plates Using Statistical Energy Analysis
...Show More Authors

 

This paper deals with a method called Statistical Energy Analysis that can be applied to the mechanical and acoustical systems like buildings, bridges and aircrafts …etc. S.E.A as a tool can be applied to the resonant systems in the circumstances of high frequency or/and complex structure». The parameters of S.E.A such as coupling loss factor, internal loss factor, modal density and input power are clarified in this work ; coupled plate sub-systems and explanations are presented for these parameters. The developed system is assumed to be resonant, conservative, linear and there is an equipartition of energy between all the resonant modes within a given frequency band in a given sub-system. The aim of th

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Tue Jan 09 2018
Journal Name
Iraqi Journal Of Cancer And Medical Genetics
Photodynamic Action of low power He-Ne laser on photosensitized human Hep-2 and AMN3 cell lines with Hematoporphyrin derivative in vitro
...Show More Authors

Photodynamic Action (PDA) by using appropriate wavelength of irradiation conjugated with porphyrin derivatives is a powerful mechanism of tumor destruction. Hematoporphyrin derivative has been shown to selectively localize in neoplastic cells and then cause destruction of them by generation of singlet oxygen when activated by low power He-Ne laser. Light which used in this study has been emitting from this laser has a wavelength equal to 632.8 nm (red light). Doses of laser had been varied from 3.6 J/cm2 to 14.4 J/cm2 . The beam of laser adjusted with a modified tissue culture plate. Cell lines had exposed to Hematoporphyrin D (HpD) for 24 hours before Laser exposure, their concentrations were varied from 5 µg/ml to 80 µg/ml. Resu

... Show More
View Publication
Crossref
Publication Date
Thu Mar 05 2026
Journal Name
3 Biotech
Broccoli-mediated biogenic gold/platinum nanohybrid for antimicrobial, antioxidant, antidiabetic, anticancer, and wound healing applications
...Show More Authors

Metallic nanoparticles are increasingly studied for their biomedical applications due to their unique physicochemical and catalytic properties. Here, a broccoli-mediated gold/platinum nanohybrid (Au@Pt NH) was synthesized using an ultrasound-assisted green method with an aqueous extract of Brassica oleracea var. italica for multifunctional biomedical evaluation. XRD and TEM confirmed a crystalline nanohybrid with an average crystallite size of 7.56 nm and a mean particle diameter of 13.08 ± 7.58 nm. The broccoli extract produced no inhibition zones, whereas Au@Pt NH inhibited Staphylococcus aureus (18 mm), Staphylococcus epidermidis (21 mm), Escherichia coli (18 mm), Klebsiella pneumoniae (20 mm), and Candida albicans (21 mm). In vivo,

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by Using Monte Carlo Method
...Show More Authors

The temperature distributions are to be evaluated for the furnace of Al-Mussaib power plant. Monte Carlo simulation procedure is used to evaluate the radiation heat transfer inside the furnace, where the radiative transfer is the most important process occurring there. Weighted sum of gray-gases model is used to evaluate the radiative properties of the non gray gas in the enclosure. The energy balance equations are applied for each gas, and surface zones, and by solving these equations, both the temperature, and the heat flux are found.

   Good degree of accuracy has been obtained, when comparing the results obtained by the simulation with the data of the designing company, and the data obtained by the zonal method. In

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Effect of Alstonia Boonei Stem Bark Extracts on the Activity of Liver Maker Enzymes in Rats Induced by Ccl4
...Show More Authors

This study investigated the outcome of Alstonia boonei stem bark on liver enzymes after inducing the Wistar albino rats with carbon tetrachloride (CCl4). This effect of plant extract was compared with silymarin – a drug commonly used for the treatment of chronic hepatocyte disorder. The plant sample was extracted with ethanol; acute toxicity study of the extract was performed on eighteen Wistar mice, while 30 rats were sacrificed for liver enzymes assay. The rats were divided into six clusters: each cluster has five rats, culster 1 served as control and was given 2 mL/kg b.w - distilled water; clusters 2 – 6 were CCl4 induced. Cluster 2 was untreated but served as the negative control while cluster 3 wa

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Iraqi Journal Of Applied Physics
Evaluation of Corrosion Resistance of Laser-Treated and PEKK-Coated Titanium
...Show More Authors

This research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref