Preferred Language
Articles
/
KRd6lJIBVTCNdQwCOLh3
Coumarin based-histone deactylace HADC inhibitors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

Scopus
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Manufacture of Graphene-based Supercapacitors

A graphene-based supercapacitors (SC) were manufactured. The main objective of this research was to use as possible as environmentally, clean and natural materials for the SC electrodes, electrolytes and the separators. The SC consisted of a multi-layer graphene (MLG); as the electrode material, prepared by mixing graphene powder with water/acetone mixture, then the solution deposited on metal foils (aluminum and copper) by chemical spray technique, which is a simple and inexpensive technique to prepare the MLG films. The spraying time was (2 and 4 minutes) for making two MLG films with different thicknesses. The electrolytes were used is (lemon juice, table salt dissolved in water, and distillated water). The separators were a commercia

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Video Steganography Method Based DWT

The video steganography is a technique to hide information inside video file.Whereas video Steganography is a very important task in real life where the users want to keep data, so the steganography process used for the secure data transmission from the sender to receiver through the internet. Least significant bit (LSB) insertion technique operates on LSB bit of the media file to hide the information bit. In this paper steganography technique used to hide the information inside compressed video as development of a standard method in order to benefit from the advantages of the compression process, which added to the video, these features are reduce storage size of video, and reduce bandwidth to transfer data in faster way with save time

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 03 2024
Journal Name
Phi Delta Kappan
Literacy-based instruction in STEM

Socio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.

Scopus Crossref
View Publication
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Endodontics
Synthesis and Preliminary Evaluation of a Polyolefin-based Core for Carrier-based Root Canal Obturation

Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete

... Show More
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Mouth Rinses on Surface Roughness of Two Methacrylate-Based and Siloraine-Based Composite Resins

Background: Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.

Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Smartphone -Based Model for Human Activity Recognition

Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More