Preferred Language
Articles
/
bsj-4719
Reactivity of O-Drug Bond in some Suggested Voltarine Carriers: Semiempirical and ab Initio Methods
...Show More Authors

In this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactants, activation energies, and transition states to final products. The suggested prodrugs aim to improve the diclofenac carrier's properties and obtain new alternatives for the approved carriers theoretically.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 07 2025
Journal Name
Journal Of Image And Graphics
Analysis Evolution of Image Caption Techniques: Combining Conventional and Modern Methods for Improvement
...Show More Authors

This study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 02 2019
Journal Name
Journal Of Planner And Development
ways to employ planning and architectural methods to rationalize the introduction of electricity
...Show More Authors

the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o

... Show More
View Publication
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Radium and Uranium Concentration in Some Plants in Iraq
...Show More Authors

In this study, the concentration of radium and uranium in the samples radish leaves, radish stalk, onion leaves, onion stalk and garlic fruits were grown in arable soil in the Botanical Garden in the College of Science for women, and garlic in special plates, the soil was taken from the above at the beginning of November 2016 was studied by using CR-39 nuclear track detectors. The radium and uranium concentration varied from 0.023 to 0.052 and from 23.13 to 52.68 Bq/kg with an average value of 0.037 and 37.58 Bq/kg respectively. The maximum value of radon concentration was 0.052 Bq/kg in fruits of garlic sample, while the minimum value was 0.023 Bq/kg in radish leaves. The values of the radium and uranium concentrations obtained from this s

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 19 2021
Journal Name
Annals Of The Romanian Society For Cell Biology 25 (6), 10203-10208‏
Effect of Boron Spray and Pollination Methods on “Zahdi” Date Palm Yield and Fruits Quality‏
...Show More Authors

Publication Date
Wed May 10 2017
Journal Name
College Of Languages-university Of Baghdad
Skills and methods for learning a foreign language( strategies of education and learning foreign language)
...Show More Authors

There is no doubt that teachers are the leaders of positive changing in community where they directed the students and build their brains. In our current generation that characterized by accelerated technological development that communication changes, economic and politics, needs from the teacher an active leadership skills that match with the soul of our generation and contribute in confrontation the current challenges and the future challenges in the form that lead to create a conscious generation where they will be a basic brick for the future community where the listeners looking forward the education where they support the continuity communication of develop process, economy, scientifically and in all life fields. In our study we take

... Show More
View Publication
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Comparison of Single and Group Bored Piles Settlement Based on Field Test and Theoretical Methods
...Show More Authors

 Bored piles settlement behavior under vertical loaded is the main factor that affects the design requirements of single or group of piles in soft soils. The estimation of bored pile settlement is a complicated problem because it depends upon many factors which may include ground conditions, validation of bored pile design method through testing and validation of theoretical or numerical prediction of the settlement value. In this study, a prototype single and bored pile group model of arrangement (1*1, 1*2 and 2*2) for total length to diameter ratios (L/D) is 13.33 and clear spacing three times of diameter, subjected to vertical axial loads. The bored piles model used for the test was 2000

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Jul 15 2023
Journal Name
2023 6th International Conference On Engineering Technology And Its Applications (iiceta)
Methodology for the Design and Programming Methods for a Smart Home
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref