Preferred Language
Articles
/
bsj-4118
Synthesis of Gold Nanoparticles by using Batch Method and Study its Antibacterial Activity
...Show More Authors

The research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration curve was calculated used to estimate Au ions in different samples. The effectiveness of gold nanoparticles prepared according to Turkevich method was studied as antibacterial agents against E. coli bacteria. The minimum inhibition concentration of gold nanoparticles that inhibit bacterial growth was calculated using the broth dilution method, which is based on several dilutions to determine the inhibition concentration.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Applied Energy
Solidification enhancement with multiple PCMs, cascaded metal foam and nanoparticles in the shell-and-tube energy storage system
...Show More Authors

View Publication
Scopus (279)
Crossref (273)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Effect of Salt and Osmotic Stresses on the Activity of Some Antioxidant Enzymes and Biochemical Traits in Catharanthus roseus
...Show More Authors

Abstract

The experiment has been carried out in the Syrian National Commission of Biotechnology, during the growing season 2018/2019, to study the effect of abiotic stresses (salinity and osmotic stresses) on the activity of some antioxidant enzymes and biochemical traits in Catharanthus roseus. The experiment has been laid according to (CRD) with three replications. The seeds have been sterilized by NaOCl solution (0.5% v/v), then planted on MS medium. Plantlets have been moved to MS medium enriched with NAA (1 mg.L-1) and BA (2 mg.L-1). The callus has been initiated from leaves using MS medium containing NAA (1 mg L-1) and KIN (2 mg.L-1). After 60 days, callus

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Relation of ?-Amylase Activity with Glucose and Anti-Gliadin IgA and IgG in Sera of Patients with Celiac Disease
...Show More Authors

Celiac disease (CD) is an inflammatory small intestinal disorder that can lead to severe villous atrophy, and malabsorption . Since the measurement of α-amylase activity is the most widely used biochemical test for the diagnosis of pancreatic and non pancreatic disease , therefore serum α-amylase were studied in the present study in an attempt to evaluate the usefulness of this enzyme in the diagnosis of celiac disease and its relationship with anti gliadin IgA and IgG and serum glucose . Thirty one patients with celiac disease were studied and compared with twenty four healthy individuals . Significant elevation of α-amylase activity , glucose and anti gliadin IgA and IgG were observed in the sera of patients with celiac diseas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
A Study of the electronic structure of CdS Nanocrystals using density functional theory
...Show More Authors

Density Functional Theory at the generalized-gradient approximation level coupled with large unit cell method is used to simulate the electronic structure of (II-VI) zinc-blende cadmium sulfide nanocrystals that have dimensions 2-2.5 nm. The calculated properties include lattice constant, conduction and valence bands width, energy of the highest occupied orbital, energy of the lowest unoccupied orbital, energy gap, density of states etc. Results show that lattice constant and energy gap converge to definite values. However, highest occupied orbital, lowest unoccupied orbital fluctuates indefinitely depending on the shape of the nanocrystal.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
كلية التربية الاساسية
رؤية مستقبلية للتطوير الإداري لكليات التربية في جامعة بغداد بأستخدام تكنولوجيا المعلومات والاتصالات
...Show More Authors

إن التطور الهائل في منظومة تكنولوجيا المعلومات والاتصالات في العالم , أثر كثيراً في الجوانب الحياتية والاجتماعية والاقتصادية والسياسية والثقافية عامة والتربوية والتعليمية خاصة, إذ أصبح لها دور كبير في تسيير الكثير من الأمور. ولا بد من القول ان المؤسسات والمنظمات لا يمكن ان تنتقل من القرن العشرين الى القرن الحادي والعشرين إلا إذا أفادت من تكنولوجيا المعلومات والاتصالات, إذ توافر هذه التكنولوجيا الكثير من ال

... Show More
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Lemon juice antioxidant activity against oxidative stress
...Show More Authors

This study is conducted to evaluate the therapeutic and antioxidant effect of lemon juice on some hematological and biochemical parameters. Thirty female mice used in this study were exposed to oxidative stress through giving them hydrogen peroxide in drinking water for 30 days. Animals randomly distributed over 3 groups, each group contained 10 animals and treated as follows: T1 control group (drinking distilled water only), T2 (0.75% hydrogen peroxide in drinking water) and T3 (0.75% hydrogen peroxide in drinking water with daily drenching with 1 mL lemon juice). At the end of the experiment, blood samples were collected from animals for evaluating the following hematological and biochemical parameters: Haemoglobin concentration (Hb),

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (8)
Scopus Clarivate Crossref