Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Fri Oct 25 2013
Journal Name
International Endodontic Journal
Fabrication and characterization of polymer composites for endodontic use
...Show More Authors

Aim To develop a low-density polyethylene–hydroxyapatite (HA-PE) composite with properties tailored to function as a potential root canal filling material. Methodology Hydroxyapatite and polyethylene mixed with strontium oxide as a radiopacifier were extruded from a single screw extruder fitted with an appropriate die to form fibres. The composition of the composite was optimized with clinical handling and placement in the canal being the prime consideration. The fibres were characterized using infrared spectroscopy (FTIR), and their thermal properties determined using differential scanning calorimetry (DSC). The tensile strength and elastic modulus of the composite fibres and gutta-percha were compared, dry and after 1 month storage in

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Characterization of Isradipine Nanoparticle for Dissolution Enhancement
...Show More Authors

Isradipine belong to dihydropyridine (DHP) class of calcium channel blockers (CCBs). It is  used in the treatment of hypertension, angina pectoris, in addition to Parkinson disease. It goes under the BCS class II drug (low solubility-high permeability). The drug will experience extensive first-pass metabolism in liver, therefore, oral bio-availability will be approximately15 to 24 %.

 

 The aim of this study was to formulate and optimize a stable  nanoparticles of a highly hydrophobic drug, isradipine by anti-solvent microprecipitation Method to achieve the higher in vitro dissolution rate, so that it will be absorbed by intestinal lymphatic transport in order to avoid hepatic first-pass metabolism&nbs

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Evidence for monotheism in Islam and the Qur’an and the meaning of the names and attributes and their unification
...Show More Authors

This topic is considered to be of a high degree of importance to every Muslim, and its importance is due to the fact that monotheism is:

Prove that God Almighty is the God who created everything and everything opposite to monotheism is polytheism, and it is taking other than God Almighty as a deity.

Therefore, we have to know the concept of God. If he is known, then he knows the concept of monotheism and the concept of polytheism

View Publication Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Keys for Isolation suborders and Families and genera and species of Book and Bark lice in Baghdad and Babylon [Order PSOCOPTERA]
...Show More Authors

A taxonomic keys was established of book and bark lice Order Psocoptera to isolated insects in Iraq from different localities of Baghdad and Babylon provinces. Thirteen species belong to eight genera and five families have been studied and described in details, these species were recorded for the first time in Iraq. These species are: Belaphopsocus badonneli New, 1971; Belaphotroctes oculeris Bodonnel, 1973; Embodopsocosis newi Bodonnel, 1973; Epipsocus stigamaticus Mockeord, 1991; Lepinotus huoni Schmidt and New, 2008; Liposcelies decolor Peramane 1925 Liposcelies paeta Pearman 1942 Liposclies bostrychphila Badonnel 1931; Liposclies brunnea Mostchulsky 1852; Liposclies entoophila Enderlein 1907; Neopsocopsis minuscule Li 2002 ;

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Pure And Applied Microbiology
Mixture Design of Experiments for the Optimization of Carbon Source for Promoting Undecylprodigiosin and Actinorhodin Production
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Structure of sex and age for population in the district of Tuz Khurmatu for (1997-2012)
...Show More Authors

The study of sex Structure and age characteristics of an important element of the
follow-up changes between different population groups, which are connected to a large degree
the demographic, social and economic characteristics, particularly since each population
group varying characteristics in terms of age, sex entail social, demographic, cultural and
economic implications, and from that the researcher has taken from Structure of sex and age
for population in the district of Tuz Khurmatu for (1997-2012 ) the subject of consideration
and maintain compared to see the contrast between them. Qualitative Research for installation
and the age of the urban and rural areas has touched the judiciary, as well as its respects

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF