Preferred Language
Articles
/
bsj-3939
Kinetic- spectrophotometric Method for the Determination of Naringenin in Pure and Supplements Formulations
...Show More Authors

          Simple, cheap, sensitive, and accurate kinetic- spectrophotometric method has been developed for the determination of naringenin in pure and supplements formulations. The method is based on the formation of Prussian blue. The product dye exhibits a maximum absorbance at 707 nm. The calibration graph of naringenin was linear over the range 0.3 to 10 µg ml-1 for the fixed time method (at 15 min) with a correlation coefficient (r) and percentage linearity (r2%) were of 0.9995 and 99.90 %, respectively, while the limit of detection LOD was 0.041 µg ml-1. The method was successfully applied for the determination of naringenin in supplements with satisfactory results.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Plasma Medicine
Thermal Effect of Laser on Silver Nanoparticles Synthesized by the Cold Plasma Method on Cancer Cells
...Show More Authors

In this study, silver nanoparticles (AgNPs) were synthesized using a cold plasma technique and a plasma jet. They were then used to explore how photothermal treatment may be used to treat lung cancer (A549) and normal cells (REF) <i>in vitro</i>. The anti-proliferative activity of these nanoparticles was studied after A549 cells were treated with (AgNPs) at various concentrations (100&#37;, 50&#37;, or 25&#37;) and exposure times (6 or 8 min) of laser after 1 h or 24 h from exposed AgNPs. The highest growth inhibition for cancer cells is (75&#37;) at (AgNPs) concentration (100&#37;) and the period of exposure to the laser is (8 min). Particle size for the prepared samples varied according to the diameter o

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The use of standard rates in the test of the financial stability for the banking sector in Iraq For the period 2009-2013
...Show More Authors

ABSTRACT

The research focuses on the key issue concerning the use of the best ways to test the financial stability in the banking sector, considering that financial stability cannot be achieved unless  the financial sector in general and the banking sector  in particular are able to perform its key role in addressing the economic and social development requirements, under the laws and regulations that control  banking sector , as the only way that increases its ability to deal with any risks or negative effects experienced by banks and other financial institutions. The research goal is  to evaluate the stability of the banking system in Iraq, through the use of a set of econometrics an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 16 2013
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences
Effects of mucoadhesive polymers combination on the properties of lisinpril buccal tablets prepared by wet granulation method
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Statistical Evaluation of the Planning Process and Scheduling Management for Irrigation and Drainage Projects in the Republic of Iraq
...Show More Authors

The Research aims to investigate into reality in terms of planning and scheduling management process for sake the implementation and maintenance of irrigation and drainage projects in the Republic of Iraq, with an indication of the most important obstacles that impede the planning and scheduling management process for these projects and ways of addressing them and minimizing their effects.                                                  For the purpose of achieving the goal of the research, a sci

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of monetary policy in achieving economic stability and growth in Iraq for the period (2004-2011)
...Show More Authors

The objective of this research to analyze the effectiveness of monetary policy in achieving economic stability and growth for the period 2004-2011 ،This period of time saw a fundamental shift in monetary policy after the issuing new law the Central Bank of the full independence of the monetary authority ،This is Prompt the monetary authority to bring about a change in the philosophy and objectives and the tools used to achieve the desired  goals ،Which give them the ability to control the size of the money supply and to achieve price stability Indeed، Monetary policy has been able to achieve the golden triangle of economic stability ،Consisted of staff، exchange rate stability and low and stable general level of prices

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Developmental loans in Developing Wheat and Barley Crops In Iraq for the Period ( 2006 – 2012)
...Show More Authors

The present paper attempts to find out the role of developmental loans in promoting strategic crops especially the basis stemming from the problem of non - defining economic feasibility study and the negative or positive revenues of developmental loans, directed to Iraqi Agricultural sector in general and Basic strategic crops in particular which resulted in the difficulty of planning and future prediction to grant loans agriculturally directed in terms of quality and quantity and the arbitrary of distributing these loans .the strategic crops have been selected as sample of population where the sample of Basic strategic crops include wheat and barley .The paper has come to several of conclusions mainly are as follows :- the increase in n

... Show More
View Publication Preview PDF
Crossref