Preferred Language
Articles
/
XOaaL5wBmraWrQ4dPkdG
A review on Chromatographic Techniques for the Determination of Pharmaceuticals in Environment
...Show More Authors

The past several years have seen an increase in awareness of the pervasiveness of medications as pollutants in the aquatic environment. The main reason for concern regarding the release of pharmaceuticals into the environment is the possibility that biological agents may become opposing to them. The development of precise and reliable analytical techniques for pharmaceutical determination in a range of samples is necessary for their safe use in the pharmaceutical industry and medical treatments. This review offers a summary of chromatographic techniques for identifying and quantifying the examination of pharmaceuticals in a range of environmental samples. Both the general public and the scientific community are currently very interested in the topic of pharmaceutical-related environmental contamination. The current review also provides an overview of the more chromatographic techniques coupled to mass spectrometry that have been created and applied for the determination of pharmaceuticals in the environment such as GC-MS, LC-MS and LC-MS/MS.

Crossref
View Publication
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Kufa Journal Of Engineering
Numerical Analysis for the Response of Skirt Circular Shallow Footing Resting on Sandy Soil under vertical loads
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Apr 01 2009
Journal Name
International Journal Of Applied Environmental Sciences
An expert System for Predicting the Effects of Noise Pollution on Grass Trimming Task Using Fuzzy Modeling
...Show More Authors

Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
The Role of Water Absorption on Thermal Conductivity and Mechanical Properties for (Recycling HDPE-Coal Ash) Composite
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Murabaha for real estate and its reflection on the profitability of Al-Nahrain Islamic Bank: applied research
...Show More Authors

The Islamic Bank of Al-Nahrain offers a formula for financing the purchase of real estate through a deferred sale contract, through Murabaha to the order to buy, and the payment of the price is in the form of instalments that include (the purchase price of the profit and the mutual agreement on the real estate). This research aims to show the reflection of real estate murabaha on the bank's investments, by measuring the effect of real estate murabaha on the profits achieved by the Islamic Bank of Al-Nahrain Bank. The growth of 'real estate murabaha' realized from the 'amounts granted by Bank X, in addition to analyzing the financial ratios of profitability indicators, including (return on deposits Y2) and for the years (2016 - 20

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying Effect of Elongational Viscosity on the Velocity Distribution for Dry/Wet-Spun Nascent Hollow Fiber Membrane
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (23)
Crossref (10)
Scopus Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Aesthetic Preoccupations of the Implicit Pattern in the Discourse of the Theatre Show (Revelations Play) - A Model
...Show More Authors

The implicit pattern is one of the cultural patterns that are present in both the text and theatrical presentation and the reading of the implicit pattern cannot take place without cognitive references, whether audio or visual as well as historical references and the natural, social and psychological dimensions of communities and individuals.

         The researcher, in this study, attempted to focus on the axis of the aesthetic preoccupations of the implicit pattern in the theatrical presentation and the definition of the implicit pattern. Methodologically speaking, the research problem focused on revealing the outlines and the main features in the aesthetic preoccupations that shape the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref