Preferred Language
Articles
/
SBi7S5QBVTCNdQwCWATi
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Toxicon
Methods for simultaneous detection of the cyanotoxins BMAA, DABA, and anatoxin-a in environmental samples
...Show More Authors

View Publication Preview PDF
Scopus (35)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Synthesis, characterization, molecular docking, ADMET prediction, and anti-inflammatory activity of some Schiff bases derived from salicylaldehyde as a potential cyclooxygenase inhibitor
...Show More Authors

A series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Biological Sciences
Investigation of Plasmid-Associated Fluoroquinolone Resistance in Nosocomial Pseudomonas aeruginosa Isolated from Infected Burn Wounds
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Malaysian Journal Of Biochemistry And Molecular Biology
Mutations in ergosterol 11 gene of fluconazol resistant candida albicans isolated from different clinical samples
...Show More Authors

Fluconazole was used to test the susceptibility of Candida albicans isolated from different clinical samples, and to detect mutations in ERG11 gene, and their relationship to fluconazole resistance. Forty-eight isolates of Candida albicans were tested for susceptibility using the disc diffusion method (M-44). ERG11 genes of six isolates were amplified (four resistant, two susceptible) and sequenced. The sequenced genes were analyzed to detect the mutations. Out of 48 isolates of Candida albicans, 4 (8%) were resistant to fluconazole. Sixteen-point mutations were detected included 13 silent mutations, and three missense mutations. The mutations of A945C (E266D) and G1609A (V488I) were found only in susceptible Candida albicans isolates, whil

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Tue Dec 19 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
MORPHOLOGICAL AND MOLECULAR STUDIES OF KAIS KINGFISH CYPRINION KAIS HECKEL, 1843 (PISCIES, CYPRINIFORMES, CYPRINIDAE) FROM THE MIDDLE OF IRAQ
...Show More Authors

Cyprinidae species are the most abundant and widely distributed fish species in the inland waters of Iraq. Cyprinids are complex species, and it is difficult to identify them on the basis of morphology. Thus, the morphological characteristics must be achieved and confirmed by molecular analysis. Twenty specimens of Cyprinion kais Heckel, 1843 (Piscies, Cypriniformes, Cyprinidae) were collected from two localities at Tigris River in the middle of Iraq: five specimens from Al-Tharthar Lake, Saladin Province, and 15 specimens from Al- Zubaydiyah sub-district, Wasit Province. The DNA sequences of C. kais were done using the mitochondrial DNA cytochrome b (cytb) gene. After analysis, the sequences were compared with sequences of ot

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
MORPHOLOGICAL AND MOLECULAR STUDIES OF KAIS KINGFISH CYPRINION KAIS HECKEL, 1843 (PISCIES, CYPRINIFORMES, CYPRINIDAE) FROM THE MIDDLE OF IRAQ
...Show More Authors

Cyprinidae species are the most abundant and widely distributed fish species in the inland waters of Iraq. Cyprinids are complex species, and it is difficult to identify them on the basis of morphology. Thus, the morphological characteristics must be achieved and confirmed by molecular analysis. Twenty specimens of Cyprinion kais Heckel, 1843 (Piscies, Cypriniformes, Cyprinidae) were collected from two localities at Tigris River in the middle of Iraq: five specimens from Al-Tharthar Lake, Saladin Province, and 15 specimens from Al- Zubaydiyah sub-district, Wasit Province

View Publication
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Isolation and identification of fungi from fish feedstuff of cyprinus carpio and detection of aflatoxin b1 and ochratoxin a using ELISA technique
...Show More Authors

This study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Ep

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Study The Influence of Forming Conditions Like Deformation Speed on Void Closure in Open Die Forging
...Show More Authors

This paper presents an investigation to the effect of the forming speed on healing voids that inhabit at various size in an ingot. The study was performed by using finite element method with bilinear isotropic material option, circular type voids were considered. The closure index was able to predict the minimum press force necessary to consolidate voids and the reduction. The simulation was carried out, on circular cross-section lead specials containing a central void of different size. At a time with a flat die, different ratio of inside to outside radius was taken with different speed to find the best result of void closure.

View Publication Preview PDF