Preferred Language
Articles
/
XhaLUYcBVTCNdQwCQERX
Synthesized Zinc Oxide Nanoparticles by The Precipitation Method on Streptococcus Spp From Dental Carries and Cytotoxicity Assay
...Show More Authors

In this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv and investigated the role of ZnO NP-induced toxicity in the IC50 values of the HdFn cells. The findings reveal the ability chemical nanoparticles to inhibit, as well as of Gram-positive bacteria.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Ecological Engineering
Removal of Nitrate from Aqueous Solution by Bio-Calcium from Iraqi Eggshells
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Studying the Adsorption of Lead from aqueous Solution using Local Adsorbent Material Produced from Waste Tires by Pyrolysis
...Show More Authors

In this research a local adsorbent was prepared from waste tires using two-step pyrolysis method. In the carbonization process, nitrogen gas flow rate was 0.2L/min at carbonization temperature of 500ºC for 1h. The char products were then preceded to the activation process at 850°C under carbon dioxide (CO2) activation flow rate of 0.6L/min for 3h. The activation method produced local adsorbent material with a surface area and total pore volume as high as 118.59m2 /g and 0.1467cm3/g, respectively. The produced . local adsorbent (activated carbon) was used for adsorption of lead from aqueous solution. The continuous fixed bed column experiments were conducted. The adsorption capacity performance of prepared activated carbons in this work

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Photochemistry And Photobiology B: Biology
High efficiency of Ag0 decorated Cu2MoO4 nanoparticles for heterogeneous photocatalytic activation, bactericidal system, and detection of glucose from blood sample
...Show More Authors

View Publication
Scopus (64)
Crossref (65)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Journal Of Scientific & Engineering Research
Transition properties of γ-ray Emitted from levels in 90Mo using 𝝈 𝑱 method
...Show More Authors

The δ-mixing ratios have been calculated for several γ-transitions in 90Mo using the 𝛔 𝐉 method. The results are compared with other references the agreement is found to be very good .this confirms the validity of the 𝛔 𝐉 method as a tool for analyzing the angular distribution of γ-ray. Key word: population parameter, γ-ray transition, 𝛔 𝐉 method, multiple mixing ratios.

View Publication
Publication Date
Mon May 22 2023
Journal Name
Bangladesh Journal Of Medical Science
Genotyping of Escherichia coli isolated from diarrhea cases in children under five years of age using the PFGE method
...Show More Authors

Preview PDF
Scopus
Publication Date
Mon Feb 13 2023
Journal Name
Aip Conference Proceedings
composition,depiction,antibacterial,antioxidant,and cytotoxicity activities studies of a new nano-sized binuclear metal(||) schiff base complexes
...Show More Authors

composition,depiction,antibacterial,antioxidant,and cytotoxicity activities studies of a new nano-sized binuclear metal(||) schiff base complexes

Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref