Preferred Language
Articles
/
2hf0v5EBVTCNdQwCiJmt
Green Method Synthesis of Silver Nanoparticles Using Leaves Extracts of Rosmarinus officinalis
...Show More Authors

The silver nanoparticles synthesized have to be handled by humans and must be available at cheaper rates for their effective utilization; thus, there is a need for an environmentally and economically feasible way to synthesize these nanoparticles. Therefore, this study aimed to synthesis of silver nanoparticles using phenolic compounds extracted from Rosmarinus officinalis. The maceration method and Soxhlet apparatus were used to prepare aqueous and methanolic Rosmarinus officinalis leaves extracts respectively, Furthermore, Rosmarinus officinalis silver nanoparticles (RAgNPs) were prepared from the aqueous and methanolic leaves extract of this plant and diagnosed using the ultraviolet (UV) spectroscopy, scanning electron microscopy (SEM), atomic fluorescence microscopy (AFM), X-ray scattering (XRD), energy dispersive X-ray (EDX) and infrared spectroscopy (FTIR). The diagnostic results showed that the nanoparticles are spherical in shape, single or combined, and crystalline for both aqueous and methanolic silver nanoparticles extract.

Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antimicrobial Evaluation with DFT Study of New Two-Amino-4-(4-Chlorophenyl) Thiazole Derivatives
...Show More Authors

2-amino-4-(4-chloro phenyl)-1,3-thiazole (1) was synthesized by refluxing thiourea with para-chloro phenacyl bromide in absolute methanol. The condensation of amine compound (1)  with phenylisothiocyanate in the presence of pyridine will  produce 1-(4-(4-chlorophenyl)thiazol-2-yl)-3-phenylthiourea(2), which is  upon treatment with 2,4 dinitrophenyl hydrazine by conventional method, afforded 1- ( 4 - ( 4 – chlorophenyl ) thiazol – 2 – yl ) – 3 - phenylhydrazonamide,N' - ( 2 , 4 -dinitrophenyl) ,(3).The characterization of the titled compounds were performed utilizing FTIR spectroscopy, 1HNMR and CHNS elemental analysis, and by me

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 23 2023
Journal Name
University Of Samarra
Synthesis, spectral characterization and thermal ‎study of complexes of ions of some metallic ‎elements with new cyclic ligands
...Show More Authors

The purpose of my thesis is to prepare four new ligands (L1-L4) that have been ‎used to prepare a series of metal complexes by reacting them with metal ions:‎ ‎ M=(Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II) ‎ ‎ Where succinyl chloride was used as a raw material for the preparation of ‎bi-dented ligands (L1-L4) by reacting it with potassium thiocyanate as a first ‎step and then reacting with (2-aminobenzothiazole, Benzylamine, 4-‎aminoantipyrine, Sulfamethoxazole) respectively as a second step with the use ‎of dry acetone as a solvent, the chemical formula of the four ligands prepared in ‎succession:‎ N1,N4-bis(benzo[d]thiazol-2-ylcarbamothioyl)succinamide (L1)‎ N1,N4-bis(benzylcarbamothioyl)succinami

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
The Linear Delay Fourth Order Eigen-Value Problems Solved By the Collocation Method
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref