Preferred Language
Articles
/
bsj-6704
Synthesis, Spectral Identification, Antibacterial Evaluationand Theoretical Study of Co, Fe, Rh and Pd Complexes for 2-benzoylthiobenzimidazol
...Show More Authors

A new novel series of metalcomplexes are prepared from reactions between 2-benzoylthio- benzimidazole (L) with metal salts of Co (II) , Fe(III) and Rh (III) , while Pd(II) complex was obtained by mixing ligandsof 2-benzoylthiobenzimidazole (L) as primary ligand and bipyridine (L/)as secondary ligand as well as palladium chloride as metal salt in an ethanoic medium. The geometry of these compounds were identified using C.H.N.microanalysis, Ultraviolet–visible, Fourier transforms infrared, magnetic susceptibility, molar conductivity and flame atomic absorption (A.A). From the dataobtained by these spectral analyses, the molecular structures for Rh and Fe complexes were proposed to be octahedral geometry. A square planar construction is proposed for Pd(II), while a Tetrahedral Geometry for Cobalt (II)complex. All of the complexes which were prepared displayedobviousconstancy and could be stored for months without showing any considerablealteration. Semi-empirical methods (ZINDO/1, ZINDO/S & PM3) were conducted to assess the heat of formation ∆H˚f, binding energy ∆Eb, and dipole moment for all compounds as theoretic study. The complexes expressnotable biological activities to pathogenic bacteria when inspected on certain bacteria. The synthesized compounds exhibited moderate toverygood antibacterial activity against bacterial strains, i.e., Escherichiacoli, Staphylococcus aureus & Pseudomonas aeruginosa.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving the Falkner-Skan Equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Optical properties for prepared polyaniline / Ferro fluid nano composites
...Show More Authors

Pure nano Ferro fluid was synthesized by chemical co-precipitation method. The composite of polyaniline with nano sized Ferro fluid was prepared by In-situ–chemical oxidation polymerization method with ammonium per sulphate as an oxidant in aqueous hydrochloric acid under constant stirring at room temperature. The optical properties, absorption, transmission, optical energy gap (Eg) and optical constant refractive index (n) have been investigated. The value of the Eg decreased with increasing Ferro fluid concentration.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Karbala International Journal Of Modern Science
Performance Simulation for Adaptive Optics Technique Using OOMAO Toolbox
...Show More Authors

The Adaptive Optics technique has been developed to obtain the correction of atmospheric seeing. The purpose of this study is to use the MATLAB program to investigate the performance of an AO system with the most recent AO simulation tools, Objected-Oriented Matlab Adaptive Optics (OOMAO). This was achieved by studying the variables that impact image quality correction, such as observation wavelength bands, atmospheric parameters, telescope parameters, deformable mirror parameters, wavefront sensor parameters, and noise parameters. The results presented a detailed analysis of the factors that influence the image correction process as well as the impact of the AO components on that process

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref