Preferred Language
Articles
/
ChZtnIsBVTCNdQwCT86U
Nanogold-Bound Copper Complexes and Their Various Applications: A Review Article
...Show More Authors

View Publication
Publication Date
Thu Jan 23 2014
Journal Name
مجلة إبن الھيثم للعلوم الصرفة و التطبيقية
Synthesis of Tetra Dentate N2O2 and their Complexes With Cu[II), Zn[II), Cd[II) and Hg[II) Ions
...Show More Authors

Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms based Path Planning for Mobile Robots
...Show More Authors

In general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot.  Simulation results, whi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of Trihydro mono and Dihydrobis(indole-3- acetic acid)Borate Ligands and Some of Their Metal Complexes
...Show More Authors

Two new ligands Na2[ H3B (BDIA)].0.05H2O (L1)(BDIA = 1-Boranyl-2,3-
Dihydro-1H-Indol-3-yl)]Acetic Acid and Na3[H2B(BDIA)2].0.3H2O.0.3CH3Ph (L2)
were synthesized by reaction of NaBH4 with indole -3- acetic acid (IAA) . The
coordination properties of ligands were studied with Co(II) , Ni(II) , Cu(II) and
Pt(IV) ions. Characterization and structural aspects of the prepared compounds were
elucidated by 1HNMR, FTIR electronic spectra, magnetic susceptibility, elemental
and metal analysis, thermal analysis (TG & DTG) and conductivity measurements.
The obtained data for metal complexes suggested square planar geometry for
copper complexes, octahedral geometry for nickel and platinium complexes and
tetrahedral geom

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
Synthesis, characterization, theoretical study and biological evaluation of Schiff base and their La(III), Ce(IV) and UO2(II) complexes
...Show More Authors

ABSTRACT. A new three metal complexes of La(III), Ce(IV) and UO2(II) ions have been synthesized based on a Schiff base derived from the condensation of L-histidine and anisaldehyde. All prepared compounds were characterized by different spectroscopic techniques and Density-functional theory (DFT) calculations. The complexes were proposed to have an octahedral structure based on the investigated results. The optimized shape, numbering system, and dipole moment vector of Ligand and La, Ce, and UO2 (1:1) chelates were investigated. The Schiff base ligand and complexes exhibit moderate action against all of the bacteria tested, with P. aeruginosa, Klebsiella sp., and E. faecalis respectively being the order of inhibition.  

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref