Preferred Language
Articles
/
Ixfp340BVTCNdQwCeijb
THE DILEMMA AND RESISTANCE OF SALMA IN FADIA FAQIRA NOVEL MY NAME IS SALMA
...Show More Authors

Crossref
View Publication
Publication Date
Fri Mar 12 2021
Journal Name
Medico Legal Update
A Comparative Study about Knowledge, Attitude, Practice of Antibiotic Use and Perceptions of the Possible Causes of Resistance between Final Year Undergraduate Students and Postgraduate Pharmacy Students
...Show More Authors

Background: Antibiotic resistance is a problem leading to difficulty in treating microbial infections thatmay occur due to many causes. For the important pharmacist role as a reference for the information and theability to access to medications, they are vital members in lowering the development of antibiotic resistance,and also they support the proper use and control of antibioticsmisuse. Our goal is comparing the knowledge,attitude, practice of undergraduate and postgraduate pharmacy students and their perceptions about thecausing factors of antibiotic resistance in Iraq.Method: A cross sectional study was conducted involving the final year bachelor and postgraduate (masterand Philosophical doctor) students from different private

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
A Dubbed Turkish Drama and their Effects of the Behavior of Algerian Women: A Survey Study of a Sample of Women – The City of Mesila is a Model
...Show More Authors

The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Kinetic Study of the Effect of Some Novel Lipid Lowering Compounds on Activities of Creatine Kinase and 3Hydroxy-3-Methyl-Glutaryl-CoA Reductase In Mice Induced Hyperlipidemia
...Show More Authors

Hyperlipidemia is one of the most important factors leading to atherosclerosis and heart disease, therefore, this study conducted to examine the effect of two newly synthesized compounds[3-(5(ethylthio)-1,3,4-thiadiazol-2-yl)-2,3-dihydro-2-(3-nitrophenyl)benzo[1-3-e] thiazin-4-one (I) and 5(4dimethyl amino) benzylidene amino)-1,3,4-thiadiazole-2-thiol(II)] on the activities of creatine kinase(CK) and 3-hydroxy-3-methylglutaryl- CoA reductase (HMGR) in male Wister mice . Also to determine the type of inhibition of these compounds on the above enzymes .The study was carried out on sixty male Wister mice aged seven to eight weeks their weight ranged(180-200 g) . The mice were grouped as: group(1): control group (12 mice).Group(2):consisted

... Show More
View Publication Preview PDF
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Effect of the opposite hierarchical training method to developing explosive power, which is characterized by speed and some functional variables for basketball players
...Show More Authors

The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact

... Show More
View Publication
Publication Date
Sun Jun 30 2013
Journal Name
International Journal For Sciences And Technology
Synthesis and anti-bacterial study of novel compounds with bis (four-, five-, and seven-membered) heterocyclic rings
...Show More Authors

New twin compounds having four-, five-, and seven- membered heterocyclic rings were synthesized via Schiff bases (1a,b) which were obtained by the condensation of o-tolidine with two moles of 4- N,N-dimethyl benzaldehyde or 4- chloro benzaldehyde. The reaction of these Schiff bases with two moles of phenyl isothiocyanate, phenyl isocyanate or naphthyl isocyanate as in scheme(1) led to the formation of bis -1,3- diazetidin- 2- thion and bis -1,3- diazetidin -2-one derivatives (2-4 a,b). While in scheme (2) bis imidazolidin-4-one (5a,b) ,bistetrazole (6a,b) and bis thiazolidin-4-one (7a,b) derivatives were produced by reacting the mentioned Schiff bases(1a,b)with two moles of glycine, sodium azide or thioglycolic acid, respectively. The new b

... Show More
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Biodegradation Studies in Vitro of Novel Poly(adipic anhydride-co-mannitol)-N-maleoyl Chitosan Networks
...Show More Authors

In this work, novel copolymers of poly(adipic anhydride-co-mannitol) were synthesized by melting condensation polymerization of poly(adipic anhydride) with five percentages of mannitol sugar, 1 to 5 Wt.%. These copolymers were purified and then, characterized by FT-IR, which was proved that the cross-linking reaction was caused by nucleophilic attack of mannitol hydroxyl group to acidic anhydride groups of poly(adipic anhydride) backbone and new ester groups were formed and appeared. Also, modified organic-soluble chitosan, N-maleoyl-chitosan, were synthesized by grafting reaction of chitosan with maleic anhydride in DMF as solvent, and it was also purified and characterized by FT-IR. Biodegradation in vitro of the IPNs of poly(adipic anhyd

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref