Preferred Language
Articles
/
HYbfPIYBIXToZYALnIA0
Ternary glycerol-based deep eutectic solvents: Physicochemical properties and enzymatic activity
...Show More Authors

The present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) and Rhizopus niveus (RNL) toward hydrolysis in ternary DESs medium was investigated. The PPL showed higher activity compared to the RNL in DESs. Molecular docking simulation of the selected DES with the substrate (p-nitrophenyl palmitate) toward PPL was also reported. It is worth noting that ternary DES systems would be viable lipase activators in hydrolysis reactions.

Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Leishmanicidal Activity of Methotrexate against Leishmania tropica Promastigotes
...Show More Authors

Leishmaniasis is one of the neglected parasitic diseases, which belongs to the family Trypanosomatidae. Cutaneous leishmaniasis is endemic in Iraq and the available drugs are of side effect or resistant by the parasite. In this study, cytotoxicity of methotrexate was investigated on the promastigotes proliferation of the Iraqi strain ofL.tropica.The results showed a significant (p ≥ 0.05) difference in growth of treated groupsat all concentration (1000, 500, 250, 125.5, 62.5, 31.25, 15.6) μM, after 24 and 48 hours of follow up, while after 72 hours, significant difference was observed at concentration(1000, 125, 62.5) μM.The IC50 measured after 24and 48 hours and it was 40.366 and 44.452 μM, respectively.The present study showed

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Biological Activity of Complexes of Some Amino Acid
...Show More Authors

Biological Activity of Complexes of Some Amino Acid

Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Antimicrobial Activity of Silver Nanoparticles on Pathogenic Bacteria
...Show More Authors

Nosocomial infection is acquired contamination of hospitals and health care units caused by multidrug resistant bacteria. Currently, bacterial resistance to antimicrobial medication represents a complicated public health problem. Recent studies on the antimicrobial activity of silver nanoparticles (AgNPs) attracted researchers worldwide to focus on the safe synthesis of AgNPs as antimicrobial agents against multidrug resistant bacteria. The antimicrobial efficacy of AgNPs on pathogenic bacteria isolated from clinical cases of acquired hospital infection was targeted in this project. Fifty specimens of stool were collected through private laboratories in Baghdad from patients who suffered diarrheal symptoms. Bacterial isolation, identific

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Experimental Study of Pre-Cast Reinforced Concrete Deep Beams (Hallow Core section) Retrofitting with Carbon Fiber Reinforced Polymer (CFRP)
...Show More Authors

Experimental programs based test results has been used as a means to find out the response of individual elements of structure. In the present study involves investigated behavior of five reinforced concrete deep beams of dimension (length 1200 x height 300 x width150mm) under two points concentrated load with shear span to depth ratio of (1.52), four of these beams with hallow core and
retrofit with carbon fiber reinforced polymer CFRP (with single or double or sides Strips). Two shapes of hallow are investigated (circle and square section) to evaluated the response of beams in case experimental behavior. Test on simply supported beam was performed in the laboratory & loaddeflection, strain of concrete data and crack pattern of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Applied Energy
Deep clustering of Lagrangian trajectory for multi-task learning to energy saving in intelligent buildings using cooperative multi-agent
...Show More Authors

The intelligent buildings provided various incentives to get highly inefficient energy-saving caused by the non-stationary building environments. In the presence of such dynamic excitation with higher levels of nonlinearity and coupling effect of temperature and humidity, the HVAC system transitions from underdamped to overdamped indoor conditions. This led to the promotion of highly inefficient energy use and fluctuating indoor thermal comfort. To address these concerns, this study develops a novel framework based on deep clustering of lagrangian trajectories for multi-task learning (DCLTML) and adding a pre-cooling coil in the air handling unit (AHU) to alleviate a coupling issue. The proposed DCLTML exhibits great overall control and is

... Show More
View Publication
Scopus (30)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Apr 18 2013
Journal Name
International Journal Of Computer Applications
Design and Simulation of Hartley based Multi Orthogonal Band OFDM
...Show More Authors

Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref