Preferred Language
Articles
/
4BZCC4kBVTCNdQwCmoSm
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors

Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of [2-(9-anthryl) -3- (1,3,4- Triazole -1- yl) -2,3- Dihydro -5,6- ene – 1,3- Oxazepine- 4,7-Dione] on Serum AST and ALT Activities
...Show More Authors

In this study , the effect of an organic compound prepared as derivative of oxazepine tested on the activities of aspartate amino trasferase (AST) and alanin amino transferase (ALT). The kinetic study of such enzymes is in the presence of oxazepine derivative.  The results revealed that the organic compound is a non competitive inhibitor for both enzymes.  The Km value for AST is 1.3 × 10-3 M and Vmax for the uninhibited is 200 U/mL and for the inhibited is 111.1 U/mL while Km value for ALT is 2.5 × 10-3 M and Vmax are 89.66 U/mL and 56.77 U/mL for the uninhibited and inhibited enzyme respectively.

View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Oriental Journal Of Chemistry
Synthesis and Antioxidant Ability of Some New 6-amino-7H- [1,2,4]triazolo[3,4-b][1,3,4]thiadiazin-3-yl) Derivatives Bearing 2,6-Dimethoxy-4-(methoxymethyl)Phenol Moiety
...Show More Authors

Compound 4-(((6-amino-7H-[1,2,4]triazolo[3,4-b][1,3,4]thiadiazin-3-yl)methoxy)methyl)- 2,6-dimethoxyphenol (6) was synthesized by multi steps. The corresponding acetonitrile thioalkyl (7) was cyclized by refluxing with acetic acid to afford 4-(((6-amino-7H-[1,2,4]triazolo[3,4- b][1,3,4]thiadiazin-3-yl)methoxy)methyl)-2,6-dimethoxyphenol (8). Two new series of 4-(((6-(3- (4-aryl)thioureido)-7H-[1,2,4]triazolo[3,4-b][1,3,4] thiadiazin-3-yl)methoxy)methyl)-2,6- dimethoxyphenol (9a-c) and of 4-(((6-(substitutedbenzamido)7H-[1,2,4]triazolo[3,4- b][1,3,4]thiadiazin-3-yl)methoxy)methyl)-2,6-dimethoxyphenol (10a-c) were synthesized as new derivatives for fused 1,2,4-trizaole-thiadiazine(8). The antioxidants of newly compounds were evaluated by DPPH

... Show More
Preview PDF
Publication Date
Wed Oct 25 2017
Journal Name
Oriental Journal Of Chemistry
Synthesis and Antioxidant Ability of Some New 6-amino-7H- [1,2,4]triazolo[3,4-b][1,3,4]thiadiazin-3-yl) Derivatives Bearing 2,6-Dimethoxy-4-(methoxymethyl)Phenol Moiety
...Show More Authors

Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Oriental Journal Of Chemistry
Synthesis and Antioxidant Ability of some new 6-amino-7H- [1,2,4]triazolo[3,4-b][1,3,4]thiadiazin-3-yl) derivatives bearing 2,6-dimethoxy-4-(methoxymethyl)phenol moiety
...Show More Authors

Compound 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (6) was synthesized by multi steps. The corresponding acetonitrile thioalkyl (7) was cyclized by refluxing with acetic acid to afford 4-(((6-amino-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (8). Two new series of 4-(((6-(3-(4-aryl) thioureido)-7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (9a-c) and of 4-(((6-(substitutedbenzamido) 7H-[1, 2, 4] triazolo [3, 4-b][1, 3, 4] thiadiazin-3-yl) methoxy) methyl)-2, 6-dimethoxyphenol (10a-c) were synthesized as new derivatives for fused 1, 2, 4-trizaole-thiadiazine (8). The antioxidant

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Experimental Investigation of a Laser Wireless Video Communication System Using Intensity Modulated /Direct Detection Technique
...Show More Authors

In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref