Preferred Language
Articles
/
EhZJR4gBVTCNdQwCu3Z_
Contributions of safety critical success factors and safety program elements to overall project success
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (70)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Mon Oct 16 2023
Journal Name
F1000research
Assessment of general population knowledge, attitude, and practice on safe unused and expired drugs disposal: a cross-sectional study
...Show More Authors

Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa

... Show More
Scopus (4)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Journal Of The Iranian Chemical Society
Synthesis, characterization and evaluating their activity as antioxidants and anticancer of new metal ion complexes with new Azo dye
...Show More Authors

This paper presents a new Azo dye that was prepared from the reaction of the Benzene-1,2-diamine and 1-(2,4,6-Trihydroxy-phenyl)-ethanone, Azo dye was used to prepare a new series of complexes with general formula: [Co2(H4L) Cl2(H2O)4] and [M2(H4L)Cl4(H2O)2] (M= Cr+3, Fe+3,Rh+3 and Ru+3). The prepared materials were different measurements including to infrared, ultraviolet-visible, and mass spectrometry, as well as thermo gravimetric analysis, differential calorimetry, and elemental analysis. Conductivity, magnetic susceptibility, metal content, and chlorine content of the complexes were also assessed. The complexes prepared from the dye were used to determine their ability to inhibit free radicals by measuring their antioxidant capacity us

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of King Saud University - Science
Characterization and applicability of the natural Iraqi bentonite clay for toxic cationic dye removal: Adsorption kinetic and isotherm study
...Show More Authors

View Publication
Scopus (58)
Crossref (57)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Saudi Endodontic Journal
Comparison of root canal transportation and centering after instrumentation through conservative and traditional access cavities using different file systems
...Show More Authors
Introduction:

While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).

Materials and Methods:

Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Thermodynamic modeling and performance analysis of photovoltaic-thermal collectors integrated with phase change materials: Comprehensive energy and exergy analysis
...Show More Authors

View Publication
Scopus (20)
Crossref (9)
Scopus Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Journal Of The Iranian Chemical Society
Synthesis, characterization and evaluating their activity as antioxidants and anticancer of new metal ion complexes with new Azo dye
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 23 2014
Journal Name
مجلة إبن الھيثم للعلوم الصرفة و التطبيقية
Synthesis of Tetra Dentate N2O2 and their Complexes With Cu[II), Zn[II), Cd[II) and Hg[II) Ions
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Veterinary Sciences
Histological and histochemical observations of the prostate gland at resting and stimulating status in adult local Dog (Canis familiaris)
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (20)
Crossref (11)
Scopus Crossref