Preferred Language
Articles
/
tkK8pZoBMeyNPGM39s5r
Induced electro-fenton process with a new electrochemical reactor design for tetracycline degradation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2012
Journal Name
Al-nahrain Journal Of Science
Synthesis and Characterization of New Azo Dye Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of 2-amino benzoic acid with phenol gave the new bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, FT-IR and UV-Vis spectroscopic technique. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentr

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Reports Of Biochemistry And Molecular Biology
Comparative Study of New Biomarkers in Iraqi DM2 with and without Complications
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis of New Derivatives of Cephalexin with Isatin and Glycine Schiff Bases
...Show More Authors

Objectives: Two derivatives of cephalexin were synthesized by reaction with isatin-glycine Schiff base and bromoisatin-glycine Schiff base separately. Methods: Cephalexin was linked through the amine group to isatin glycine and bromoisatin glycine Schiff bases by amide bond formation. Results: These derivatives were characterized by FT-IR, H-NMR, elemental CHN analysis and then tested for their antimicrobial activity compared to cephalexin against gram-positive, gram-negative bacteria and Candida albicans fungi. Conclusion: The two compounds showed better activity against Staphylococcus aureus, compound 3b is more active against Escherichia coli, and compound 3a is more active against Klebsiella pneumonia.

Scopus (1)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Dec 12 2003
Journal Name
Iraqi Journal Of Laser
Carbon Dioxide Laser Treatment of Viral Warts: A New Approach
...Show More Authors

Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a

... Show More
View Publication Preview PDF