Preferred Language
Articles
/
jhe1rpIBVTCNdQwCT72f
Ultrasound-Assisted and One-Pot Synthesis of New Fe3O4/Mo-MOF Magnetic Nano Polymer as a Strong Antimicrobial Agent and Efficient Nanocatalyst in the Multicomponent Synthesis of Novel Pyrano[2,3-d]pyrimidines Derivatives
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Al-salam Journal For Medical Science
A review of recent developments in pharmaceutical chemistry on biological evolution of tetrazole derivatives
...Show More Authors

This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.

View Publication
Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
The Optical Limiting Behaviour of Prepared Silver Nanoparticles Embedded in Polymer Film
...Show More Authors

In the present work, silver nanoparticles were prepared. Nonlinear optical properties and
optical limiting of silver nanoparticles were investigated.Standard chemical synthesis method was used at
diffrent weight ratio(0.038, 0.058 and 0.078) of silver nitrate. Several testing were done to obtain the
characteristics of the sample. Z-Scan experiments were performed using 30 ns Q-switched Nd:YAG
laser at 1064 nm and 532 nm at different intensities. The results showed that the nonlinear refractive
index is directly proportional to the input intensities, which caused by the self-focusing of the material.
In addition, the optical limiting behavior has been studied. The results showed that the sample could be
used as an opt

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (10)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Baghdad Science Journal
The effect of Bio and Nano Fertilizer on Growth and Yield of Basil Plant and its Content of Active Ingredients
...Show More Authors

A factorial experiment was conducted at the College of Education for Pure Sciences Ibn al Haitham/University of Baghdad for the 2023 growing season to study the effect of the biofertilizer represented by the mycorrhizae vaccine and the NPK Nano fertilizer on some indicators of vegetative and root growth, yield, and volatile oil production of the basil plant, Ocimum basilicum L., the experiment included two factors. The rst factor was mycorrhizae inoculum at 2 levels: 0 (no addition) and an addition of 25 g plant–1, as the seeds were inoculated upon planting. The second factor was spraying the plant’s shoots with NPK Nano fertilizer at four levels (0, 0.5, 1, 1.5) g l–1. The results showed a signicant eect of the treatment of inocula

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 12 2023
Journal Name
المجلة الدولية للتنمية في العلوم الاجتماعية والإنسانية
the Ottoman Empire in the Nineteenth Century (Iraq as a Model)the Ottoman Empire in the Nineteenth Century (Iraq as a Model)
...Show More Authors

One of the most important features of American foreign activity during the second half of the 19th century was the encouragement of sending Protestant missionary missions to all countries around the world. The mission of these missions was facilitated by the weakened state of the Ottoman Empire, the increasing influence of European countries, and their interference in its internal affairs. Despite the Ottoman efforts to counter the activities of these missions, the American missionary missions adopted a well-planned strategy that suited the conditions of the region, aimed at achieving their goals through direct and indirect methods, including intervention in the field of education. These missions gave great importance to educational aspects

... Show More
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Lambert
The concept of Evil in J.R.R.Tolkien Novel Lord of the Rings
...Show More Authors

Evil pervades the narrative scene in Tolkien. Hence; his major themes in The Lord of the Rings are shown to be the Evil Nature of Power, the Tyranny of Technology and War as a Destructive Agent. Evil is not as powerful as good. The Boethian conception of evil comes through evil beings such as Melkor Morgoth in The Silmarillion or Sauron ,who cannot do good things but only pervert or mock things; In The Lord of the Rings; Tolkien seems to suggest that there is no absolute evil. The other conception of evil is the Manichaen, a conception which receives more emphasis in Tolkien's trilogy and which sees the world as a battle-ground for warring forces of good and evil. Tolkien frequently personifies the Ring as if it were acting with a will of i

... Show More