Preferred Language
Articles
/
bijps-1076
Detection and isolation of flavonoid and aromatic acid from Cynara scolymus different parts cultivated in iraq
...Show More Authors

The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).

Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-performance liquid chromatography HPLC from the ethyl acetate fraction of capsule.

Then identified by High Performance Thin Layer Chromatography HPTLC, High performance liquid chromatography HPLC diode array , ultraviolet diode array UV-diode array and Liquid Chromatography /Mass Spectroscopy LC/MS. The chloroform fraction from the capsule was evaluated by Gas Chromatography//Mass Spectrometer(GC/MS). The different chromatographic and spectroscopic techniques revealed the presence of luteolin, apigenin and cinnamic acid in capsule of Cynara scolymus, also 9-octadecanoic acid (oleic acid), Oxalic acid, allyl tetradecyl ester, limonene, in chloroform of Cynara scolymus.

The results of the current study proved the presence of luleolinapigenin  and cinnamic acid in the ethyl acetate fraction of Cynara scolymus capsule.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection
...Show More Authors

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 22 2023
Journal Name
Karbala International Journal Of Modern Science
Biogenesis Synthesis of ZnO NPs: Its adsorption and photocatalytic activity for removal of acid black 210 dye
...Show More Authors

Abstract This study investigated the treatment of textile wastewater contaminated with Acid Black 210 dye (AB210) using zinc oxide nanoparticles (ZnO NPs) through adsorption and photocatalytic techniques. ZnO NPs were synthesized using a green synthesis process involving eucalyptus leaves as reducing and capping agents. The synthesized ZnO NPs were characterized using UV-Vis spectroscopy, SEM, EDAX, XRD, BET, Zeta potential, and FTIR techniques. The BET analysis revealed a specific surface area and total pore volume of 26.318 m2/g. SEM images confirmed the crystalline and spherical nature of the particles, with a particle size of 73.4 nm. A photoreactor was designed to facilitate the photo-degradation process. The study investigated the inf

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Nov 14 2022
Journal Name
Journal Of Reinforced Plastics And Composites
Effect of phosphoric acid molarity on the structural, thermal, mechanical, and electrical properties of polyimide/polyaniline nanocomposites
...Show More Authors

In this paper, we used two monomers, 3,3',4,4'-benzophenone tetracarboxylic dianhydride (BTDA) and m,m'-diaminobenzophenone (m, m’-DABP), to produce polyamide acid and then converted it to polyimide (PI). The effects of phosphoric acid (H3PO4) molarity (1, 2, and 3 M) on the structural, thermal, mechanical, and electrical characteristics of the polyimides/polyaniline (PI/PANI) nanocomposites were studied. Two sharp reflection peaks were developed by the addition of PANI to PI. When 3 M H3PO4 is added, the crystalline sharp peak loses some of its intensity. The complex formation of PI/PANI-H3PO4 was confi

... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis and Preliminary Pharmacological Evaluation of Aminobenzensulfonamides Derivatives of Mefenamic Acid as a Potential Anti-inflammatory Agents
...Show More Authors

A group of amino derivatives [4-aminobenzenesulfonamide,4-amino-N¹ methylbenzenesulfonamide, or N¹-(4-aminophenylsulfonyl)acetamide] bound to carboxyl group of mefenamic acid a well known nonsteroidal anti-inflammatory drugs (NSAIDs) were designed and synthesized for evaluation as a potential anti-inflammatory agent.  In vivo acute anti-inflammatory activity of the final compounds (9, 10 and 11) was evaluated in rat using egg-white induced edema model of inflammation in a dose equivalent to (7.5mg/Kg) of mefenamic acid. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the 4-amino-N-methylbenzenesulfonamide derivative (c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref