Preferred Language
Articles
/
VBjg2pYBVTCNdQwCZYe1
GREEN SPECTROPHOTOMETRIC METHOD FOR CONCURRENT ESTIMATION OF PIROXICAM AND MEFENAMIC ACID MIXTURE
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jun 01 2019
Journal Name
Prensa Medica Argentina
The effect of niclosamide in acetic-acid induce colitis: An experimental study
...Show More Authors

Scopus (25)
Scopus
Publication Date
Tue Sep 19 2023
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
Exploring the biological activity of organotin carboxylate complexes with 4-sulfosalicylic acid
...Show More Authors

ABSTRACT. 4-Sulfosalicylic acid (SSA) was used as a ligand to prepare new triphenyltin and dimethyl-tin complexes by condensation with the corresponding organotin chloride salts. The complexes were identified by different techniques, such as infrared spectra (tin and proton), magnetic resonance, and elemental analyses. The 119Sn-NMR was studied to determine the prepared complexes' geometrical shape. Two methods examined the antioxidant activity of (SSA) and prepared complexes; Free radical scavenging activity (DPPH) and CUPRRAC methods. Tri and di-tin complexes gave high percentage inhibition than ligands with both methods due to tin moiety; the triphenyltin carboxylate complex was the best compared with the others. Also, antibacter

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 25 2023
Journal Name
International Journal Of Drug Delivery Technology
The Protective Eff ect of Cinnamic Acid against Ulcerative Colitis in Mice
...Show More Authors

Objective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy

... Show More
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Aug 21 2025
Journal Name
Research On Crops
Effect of organic acid, amino acids and nano-fertilizer on growth, yield and nitrate concentration of lettuce plant under two farming systems
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Scienc
Synthesis, Spectral and Bacterial Studies of Mixed Ligand Complexes of Schiff Base Derived from Methyldopa and Anthranilic Acid with Some Metal Ions
...Show More Authors

Bidentate Schiff base ligand 3-(3,4-Dihydroxy-phenyl)-2-[(4-dimethylamino-benzylidene)-amino]-2-methyl-propionic acid was prepared and characterized by spectroscopic techniques studies and elemental analysis. The Cd(II), Ni(II), Cu(II), Co(II), Cr(III),and Fe(III) of mixed-ligand complexes were structural explicate through Moler conductance , [FT-IR, UV-Vis & AAS], chloride contents, , and magnetic susceptibility measurements. Octahedral geometries have been suggested for all complexes. The Schiff base and its complexes were tested against various bacterial species, two of {gram(G+) and gram(G-)} were shown weak to good activity against all bacteria.

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Applied Ecology And Environmental Research
EFFECT OF SPRAYING WITH FOLIC ACID AND YEAST EXTRACT ON THE GROWTH, YIELD AND CALCIUM OXALATE CONCENTRATION OF SPINACH (SPINACIA OLERACEA L.)
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparations of Organoclay Using Cationic Surfactant and Characterization of PVC/ (Bentonite and Organoclay) Composite Prepared via Melt Blending Method
...Show More Authors

Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively.  The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the

... Show More
View Publication Preview PDF