Preferred Language
Articles
/
bsj-1038
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Using Multiattribute Analysis to Predicting Effective Porosity of Yamama Formation in Nasriya Oilfield Southern Iraq
...Show More Authors

Emerge application was used in Hampsson-Russell programs and that uses a combination of multiple 3D or 2D seismic attributes to predict some reservoir parameter of interest. In this research used the seismic inversion technique was performed on post-stack three dimensions (3D) seismic data in Nasriya oilfield with five wells  and then used this results in  Emerge analysis (training and application) were used to estimate reservoir properties (effective porosity) with multiattribute analysis derive relations  between them at well locations. The horizon time slice of reservoir units of (Yb1, Yb3 and Yc) of Yamama Formation was made for property (effective porosity) to confirm match results and enhancement trends within these

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Ndt & E International
Porosity evaluation of in-service thermal barrier coated turbine blades using a microwave nondestructive technique
...Show More Authors

View Publication
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Tue Nov 22 2016
Journal Name
Der Pharma Chemica
Evaluation of Commercial Antacid Tablets in Iraq
...Show More Authors

Antacids are commonly used drugs which are considered inert and free of pharmacological effect by many patients and physicians. They are weak bases that neutralize the gastric acid and relief pain. These weak bases dissociate to neutralize gastric acid and form neutral salts. The ultimate goal of antacid therapy is to reduce the concentration and a total load of acid in gastric juice to a pH 4 - 5. This in vitro study was promised to study the acid neutralizing capacity (ANC) of six commonly available antacids tablets in the Iraqi market by using back titration method. The highest ANC values were for Rennie (17.131± 0.083 and 16.926± 0.052 mEq) in two different hydrochloric acid (HCl) concentrations 1N and 0.5 N, respectively. The static

... Show More
Scopus (1)
Scopus
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Carbonate Ramp Facies and Porosity Recognition: Case Study of the Late Albian-Early Cenomanian Mauddud Formation in Ratawi Oilfield, Southern Iraq
...Show More Authors

     The carbonate ramp facies of the Late Albian-Early Cenomanian Mauddud Formation were studied in the Ratawi Oilfield, Basra Governorate, south of Iraq using integrated borehole data set that included, core and cutting samples in three drilled wells to analyze the petrography of the Mauddud Formation, two hundred and eighty-one (281) thin sections were prepared and examined for the three selected wells. The results show that the formation is composed of light grey dolomitized limestone and pseudo-oolitic creamy limestone with green to bluish shale. The petrographic observations results show four facies’ associations in the Mauddud Formation. These include:  Mid–Ramp environment which is represented by Argillaceous mudstone mi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A Study of Some of the Indicators of Noise Pollution in Certain Residential Districts in Fallujah City
...Show More Authors

     The aim of this study was to evaluate the effects of noise exposure in certain residential districts in Fallujah city. Twenty-nine stations were selected and divided into two groups; the first group was located 50 to 100 metres from the main streets (quiet areas), whilst the second was located directly on the main streets. Noise levels were measured at a rate of three readings per station for different time periods for approximately sixty days in the year 2020. Mean values were taken in both the morning and evening using a portable sound level meter (Auto range, RS-232). The highest noise level was measured at Alforkan station for the morning reading (83.8 dB) within the second group, while the lowest noise level

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Genetic Algorithm based Clustering for Intrusion Detection
...Show More Authors

Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Ibuprofen in Pharmaceutical Formulations Using Differential Pulse Polarography
...Show More Authors

     A reliable differential pulse polarographic (DPP) method has been developed and applied for the determination of ibuprofen IBU in dosage form with dropping mercury electrode (DME) versus Ag/AgCl. The best peak was found at cathodic peak of -1.18 V in phosphate buffer at pH=4 and 0.025M of KNO3 as supporting electrolyte. In order to obtaine the highest sensitivity, instrumental and experimental parameters were examined including the type and concentration of supporting electrolyte, pH of buffer solution, pulse amplitude and voltage step time. Diffusion current showed a direct linear relationship to ibuprofen concentration in the range of (5 – 30) μg. mL-1 (2.43× 10-5

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF