Preferred Language
Articles
/
-BZwdIcBVTCNdQwCqEtB
The morphological analysis of crystalline methadone: a novel combination of microscopy techniques
...Show More Authors

The aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±2.9 Vs 9.6±4.6 µm thick, respectively. There were significant differences between SEM and CM thickness measurements (U=1283, p<0.05), as the SEM exhibited thinner diamond crystals. The combined use of PLM and Michel-Levy chart enabled the observation of a predominantly yellow coloured MDN crystal, mean thickness at (428 nm) mean retardation value. Conclusion: The SEM was superior and successfully determined MDN crystal dimensions for the first time, whilst the CM results were affected by the Rhodamine dye staining process used for visualisation. The qualitative analysis of the crystallinity status of methadone hydrochloride optimally achieved using a combination of PLM and SEM techniques

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Statistical analysis from a Gender perspective
...Show More Authors

This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Gingival Marginal Leakage of Different Tooth Colored Materials Combination as an Intermediate Layer in Class II Composite Restoration (A Comparative In Vitro Study)
...Show More Authors

Background: The aim of this in vitro study was to evaluate and compare the microleakage between Vertise Flow T M composite material and other conventional (Filtek Z250, riva light cure and SDR) composite materials when restoring CII mesial box only cavity at gingival margin through die penetration test Materials and methods: Forty maxillary first premolars were prepared with class II box design only cavities. Samples were divided into four groups of ten teeth according to material used: group I (FiltekZ250 only). Group II (SDR+FiltekZ250). Group III (Vertise Flow +FiltekZ250). Group IV (Riva light cure+ FiltekZ250). After 24 hrs. immersion in 2% in methylene blue, samples were sectioned and micro leakage was estimated. Results: None of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Fracture strength of laminate veneers using different restorative materials and techniques (A comparative in vitro stuy)
...Show More Authors

Background: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 22 2023
Journal Name
Microbial Science Archives
Unveiling Westiellopsis akinetica: a novel species in the Iraqi habitat, and contrasting its distinctive attributes with Westiellopsis prolifica
...Show More Authors

This is the first record of a new species of cyanobacteria Westiellopsis akinetica in the Iraqi environment, Samples were collected on June 2013 and the existence of it was not documented before. We isolated and purified this species ten years ago in Iraq, but we couldn't identify accurately based on all taxonomic handbooks. This is due to the species features being different from the other documented species in the available taxonomic lectures. It resembled many species by morphological characteristics such as Fischerella muscicola, Fischerella thermalis, Westiellopsis biateralis SA16. Westiellopsis interrupta, Westiellopsis persica SA33, Westiellopsis prolifica and Symphyonema bifilamentata. Describing a new species of the Westiellops

... Show More
View Publication
Crossref