Preferred Language
Articles
/
CxfhfJMBVTCNdQwCyNTE
Structural and optical properties of iron oxide α-Fe2O3 nanowires prepared by hydrothermal method
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Structural violence: A study In Johann Galtung's theory of explanation he violence t
...Show More Authors

This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Structural study Using 2D Seismic Reflection Data of East lake Razzazah Area, Central Iraq
...Show More Authors

     This research is focused on an interpretive of 2D seismic data to study is reinterpreting seismic data by applying sufficient software (Petrel 2017) of the area between Al-Razzazah Lake and the Euphrates river belonging to Karbala'a and Al-Anbar Governorates, central Iraq. The delineation of the sub-surface structural features and evaluation of the structure of Najmah and Zubair Formations was done. The structure interpretation showed that the studied area was affected by normal fault bearing (NW-SE) direction with a small displacement. In contrast, time and depth maps showed monocline structures (nose structures) located in the western part of the studied area.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Chronic Exposure of Cadmium Chloride in Drinking Water on Structural and Functional Aspects of Thyroid Gland in Mature Male Rabbits
...Show More Authors

The effect of chronic exposure to two different levels of cadmium chloride (CdCl2) 30 ppb and 40 ppb in drinking water for 12 weeks on thyroid function of mature male rabbits was studied. Eighteen mature male rabbits  were randomly divided into three groups (each of six ) , control group (group I ): were offered ordinary tap water , and treated groups (II and III ) were offered tap water containing 30ppb and 40 ppb respectively for 12 weeks .Serum concentration of  thyroxin (T4 ) and triiodothyronine (T3) were measured every six weeks ,as an index  of  thyroid function , further more ,  section of thyroid gland were prepared for histological studies. The results showed that  chronic exposure of male rabbits

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
3D seismic reflection study for subsurface structural picture of Dujaila Oil Field, South of Iraq
...Show More Authors

This research represents a 3D seismic structural study for 602.62 Km2 of Dujaila
Oil Field which is located 55 Km Northwest of Mysan province and 20 Km Southwest
of Ali-AlSharki region within unstable Mesopotamian basin.
Synthetic traces are prepared by using available data of two wells (Du-1, Du-2), in
order to define and pick the reflectors. Two reflectors are picked that represent the top
and bottom of Mishrif Formation, in addition to five units within this Formation are
picked, they named Units 1, 2, 3, 4, and 5.
Time maps for the top and bottom of Mishrif reflectors are drawn to get the
structural picture, these maps show general dip of layers toward NE, and thus, there
are two enclosure domes in the midd

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Separation and Micro Determination of Zinc(II) and Cadmium(II) in Food Samples Using Cloud Point Extraction method
...Show More Authors

    The cloud point extraction technique has become increasingly popular in recent years for trace metal separation and preconcentration. When heated to a specific temperature, cloud point extraction utilizes the property of nonionic surfactants in aqueous solutions to generate micelles and become turbid (so-called cloud point temperature). For analytical chemists, developing a simple and selective technology for the separation and determination of metals and medicinal drugs is a critical concern. Therefore, a sensitive, accurate, and green cloud point extraction (CPE) procedure was developed for the micro-determination of metal cations like zinc (II) and cadmium (II) in food samples. Triton X–114 and 1-(4-(Phenyldiazenyl) phenyl) a

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Chemistry And Materials Research
Simple RP-HPLC Method for Estimation of Furosemide, Carbamazepine, Diazepam and Carvedilol in Bulk and Pharmaceutical Dosage Forms
...Show More Authors

A simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and li

... Show More
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 26 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of shifting the class I cavity position prepared in posterior teeth buccally and lingualy on stress distribution (Finite element analysis study)
...Show More Authors

Background: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical

... Show More
View Publication Preview PDF