Preferred Language
Articles
/
8xgr3pYBVTCNdQwCnoeR
GREEN SPECTROPHOTOMETRIC METHOD FOR CONCURRENT ESTIMATION OF PIROXICAM AND MEFENAMIC ACID MIXTURE
...Show More Authors

The purpose of this work is to concurrently estimate the UVvisible spectra of binary combinations of piroxicam and mefenamic acid using the chemometric approach. To create the model, spectral data from 73 samples (with wavelengths between 200 and 400 nm) were employed. A two-layer artificial neural network model was created, with two neurons in the output layer and fourteen neurons in the hidden layer. The model was trained to simulate the concentrations and spectra of piroxicam and mefenamic acid. For piroxicam and mefenamic acid, respectively, the Levenberg-Marquardt algorithm with feed-forward back-propagation learning produced root mean square errors of prediction of 0.1679 μg/mL and 0.1154 μg/mL, with coefficients of determination of 0.99730 and 0.99942, respectively. The suggested approach’s ease of use, affordability, and environmental friendliness make it a suitable replacement for the use of hazardous chemicals in the routine investigation of the selected drugs

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Nov 28 2025
Journal Name
Research On Crops
Effect of organic acid, amino acids and nano-fertilizer on growth, yield and nitrate concentration of lettuce plant under two farming systems
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Scienc
Synthesis, Spectral and Bacterial Studies of Mixed Ligand Complexes of Schiff Base Derived from Methyldopa and Anthranilic Acid with Some Metal Ions
...Show More Authors

Bidentate Schiff base ligand 3-(3,4-Dihydroxy-phenyl)-2-[(4-dimethylamino-benzylidene)-amino]-2-methyl-propionic acid was prepared and characterized by spectroscopic techniques studies and elemental analysis. The Cd(II), Ni(II), Cu(II), Co(II), Cr(III),and Fe(III) of mixed-ligand complexes were structural explicate through Moler conductance , [FT-IR, UV-Vis & AAS], chloride contents, , and magnetic susceptibility measurements. Octahedral geometries have been suggested for all complexes. The Schiff base and its complexes were tested against various bacterial species, two of {gram(G+) and gram(G-)} were shown weak to good activity against all bacteria.

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Applied Ecology And Environmental Research
EFFECT OF SPRAYING WITH FOLIC ACID AND YEAST EXTRACT ON THE GROWTH, YIELD AND CALCIUM OXALATE CONCENTRATION OF SPINACH (SPINACIA OLERACEA L.)
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Study the effect of acid immersion on the hardness of (Epoxy – Granite) composite
...Show More Authors

This work has been done with using of epoxy resin mixed with Granite powder were weighted by percent volume (5,10,15, and 20)%and then mixed with epoxy polymer to compose polymer composite. Hand lay-up technique is used in fabrication of the composite samples. Hardness test was carried out for the proper samples in both normal condition and after immersion in HCL (1 M and 2 M) solutions for periods ranging up to 10 weeks. After comparing the results between the polymer and their composite, the hardness increased with increasing Granite weight percent, it was found that Hardness were greater for the composites before immersion compared with their values after immersion.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by surface chemical reactio

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
the effect of ethanol on the level of sialic acid in the brain
...Show More Authors

The study dosage ethanol in the total content of acid sialic TC and acid sialic associated fat (LBSA) in blood serum and congener brain Dkor Jerd eggs study included dosage 20 animals of male rat Ald ethanol daily for a period of four weeks and concentrations 20% and 30%, 40%, 50% and size of dose 5mlThe results of the study showed that levels of TSA homogeneous in the brain and blood serum significantly reduced Ankhvaza

View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref