RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2
SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
Cadastral maps are the main documents of ownership and plots of land, as it contribute to preserving the property rights of individuals and institutions. It indicates the size and shape of each parcel and reveals geographic relationships that affect property value. The Iraqi cadastral maps are in old coordinate system AL-nahrwan 1934 and lambert conformal conic projection. Therefore these maps are old and unfit for use. The main objective of this paper is to investigate the effect of cartographic properties on updating cadastral maps. This depends on studying the effect of conversion the projection and the datum of the cadastral maps of the study area from (datum: nahrwan34, projection: lambert confo
The synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreObjectives: This study aims to broaden our knowledge of the role of eDNA in bacterial biofilms and antibiotic-resistance gene transfer among isolates. Methods: Staphylococcus aureus, E. coli, and Pseudomonas aeruginosa were isolated from different non-repeated 170 specimens. The bacterial isolates were identified using morphological and molecular methods. Different concentrations of genomic DNA were tested for their potential role in biofilms formed by study isolates employing microtiter plate assay. Ciprofloxacin resistance was identified by detecting a mutation in gyrA and parC. Results: The biofilm intensity significantly decreased (P < 0.05) concerning S. aureus isolates and insignificantly (P > 0.05) concernin
... Show More