Preferred Language
Articles
/
yRc-WZABVTCNdQwCvIdD
Automatic Co-registration of UAV-Based Photogrammetry and Terrestrial Laser Scanning in Urban Areas
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization of New Metal Complexes of Co (II), Cu (II), Cd (II) and Ru (III) from azo ligand 5-((2-(1H-indol-2-yl)ethyl) diazinyl)-2- aminophenol, Thermal and Antioxidant Studies
...Show More Authors

A novel metal complexes Cu (II), Co (II), Cd (II), Ru (III) from azo ligand 5-((2-(1H-indol-2-yl)
ethyl) diazinyl)-2-aminophenol were synthesized by simple substitution of tryptamine with 2-aminophenol.
Structures of all the newly synthesized compounds were characterized by FT IR, UV-Vis, Mass spectroscopy
and elemental analysis. In addition measurements of magnetic moments, molar conductance and atomic
absorption. Then study their thermal stability by using TGA and DSC curves. The DCS curve was used to
calculate the thermodynamic parameters ΔH, ΔS and Δ G. Analytical information showed that all complexes
achieve a metal:ligand ratio of [1:1]. In all complex examinations, the Ligand performs as a tri

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Crossref
Publication Date
Thu Oct 12 2017
Journal Name
Iraqi Journal Of Laser
A Comparative Evaluation of Post-Operative Pain and Function after Gingival Depigmentation Using 940 Nm Diode Laser And Conventional Bur Method: 6 Months Study
...Show More Authors

The aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Quadtree partitioning scheme of color image based
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Oncology And Radiotherapy
The Effect of Green Low Laser (LLL) on the white blood cells on platelet on people on brain and prostate cancer
...Show More Authors

The effect of Low-Level Laser (LLL) provided by green semiconductor laser with an emission wavelength of 532 nm on of human blood of people with brain and prostate cancer has been investigated. The effect of LLL on white blood cell (WBC), NEUT, LYMPH and MONO have been considered. Platelet count (PLT) has also been considered in this work. 2 ml of blood sample were irradiating by a green laser of the dose of 4.8 J/cm2. The results suggest a potential effect of LLL on WBC, PLT, NEUT, LYMPH, and MONO of people with brain and prostate cancer Key words: white blood cell , platelet , low-level laser therapy

Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Structural, Optical, and Morphological Study of the Zinc Oxide Nano-Thin Films with Different Thickness Prepared by Pulsed Laser Deposition Technique
...Show More Authors

The goal of this investigation is to prepare zinc oxide (ZnO) nano-thin films by pulsed laser deposition (PLD) technique through Q-switching double frequency Nd:YAG laser (532 nm) wavelength, pulse frequency 6 Hz, and 300 mJ energy under vacuum conditions (10-3 torr) at room temperature. (ZnO) nano-thin films were deposited on glass substrates with different thickness of 300, 600 and 900 nm. ZnO films, were then annealed in air at a temperature of 500 °C for one hour. The results were compared with the researchers' previous theoretical study. The XRD analysis of ZnO nano-thin films indicated a hexagonal multi-crystalline wurtzite structure with preferential growth lines (100), (002), (101) for ZnO nano-thin films with different thi

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 26 2020
Journal Name
International Journal Of Pharmaceutical Research
Complexes of Co(II), Cu(II), Ni(II), Pt(II) And Pd(II) with N 3 O-Chelating Ligand Incorporating Azo and Schiff Base Moieties: Synthesis, Spectroscopic, Thermal Decomposition, Theoretical Studies, and thermodynamic parameters
...Show More Authors

Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Carbon-13 Characterization and Modelling for Temperature Measurement-Based Proton Frequency
...Show More Authors

The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wi

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref