Preferred Language
Articles
/
Ghdjw44BVTCNdQwC9Fia
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Synthesis and Spectral Studies of Co(II),Ni(II),Zn(II) and Cd(II) Complexes with Ligand 2-[4- Carboxy methyl phenyl azo] -4,5-diphenyl imidazole (4CMeI)
...Show More Authors

A new chelate complexes of Co(II),Ni(II),Zn(II) and Cd(II) were prepared by reacting these ions with the ligand 2-[4- Carboxy methyl phenyl azo]-4,5-diphenyl imidazole (4CMeI) The preparation were conducted after fixing the optimum conditions such as (pH) and concentration .UV- visible spectra of these complex solutions were studied for a range of (pH) and concentration which obey lampert-Beers Law.The structures of complexes were deduced according to mole ratio method which were obtained from the spectroscopic studies of the complex solutions .The ratios of metal: ligand obtained were (1:2) for all complexes..(UV-Vis) absorption spectra and The infrared spectra of the chelating complexes were studied ,this may indicate that coordination be

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 19 2020
Journal Name
Egyptian Journal Of Chemistry
Synthesis, characterization, industrial and biological application of Co(II),Ni(II),Cu(II) and Zn(II) complexes with azo ligand derived from metoclopramide hydrochloride and 3,5-dimethylphenol
...Show More Authors

Four complexes of Co(II),Ni(II),Cu(II) and Zn(II) with the azo ligand (4-chloro-N-(2-(dimethylamino)ethyl)-5-((2-hydroxy-4,6-dimethylphenol)diazenyl)-2-methoxybenzamide) L. The structure of ligand and complexes were confirmed on the basis of their analytical and spectral data, these dyes were tested as dyeing in cotton fabric, and also testing in light and cleaner firmness. Also, antimicrobial and antifungal activities of ligand and their complexes were evaluated and the results showed that the ZnL compound showed the higher antibacterial activity with inhibition zone of 13mm against Staphyloco-ccus epidermidis, Steptococcus sp. and Escherichia coli compared with ligand and other metal complexes .In case of ZnL compound the antifungal activ

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Electronics
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Oct 02 2015
Journal Name
American Journal Of Applied Sciences
Advances in Document Clustering with Evolutionary-Based Algorithms
...Show More Authors

Document clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Therapeutic Delivery
Particles-based Medicated Wound Dressings: A Comprehensive Review
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref