Preferred Language
Articles
/
fxcj6o8BVTCNdQwCzYD_
A new thiazoldinone and triazole derivatives: Synthesis, characterization and liquid crystalline properties
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 04 2021
Journal Name
Medico-legal Update
Saliva of Tobacco Smokers a Profile of C3, IgA, Amylase and Total protein
...Show More Authors

Objective: The present study aimed to shed light on the role of narghileh and cigarette smoking on immunity status of oral cavity by assess (C3 complement component, Immunoglobulin A, Total protein, α-Amylase and EBV IgG antibody). Method: Saliva levels in two smokers groups the first include 28 narghileh smokers and the second include 32 narghileh and cigarette smokers as well as 30 non-smokers consider as control. Results: As compared control, the levels of C3, IgA and total protein were significantly decreased, and the highest decreased was observed in saliva of narghileh and cigarette smokers, the result was (C3= 0.400±0.194 µg vs. 9.728±3.561 µg; IgA= 2.460±0.492 mg/dl vs. 5.048±0.937 mg/dl; Total protein= 170.20±45.93 mg% vs.

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Multimodal Analysis of Hyperbolic Devices in Advertisements of Health and Beauty Products
...Show More Authors

         This paper examines the use of one of the most common linguistic devices which is hyperbole. It shows how hyperbolic devices are used as an aspect of exaggeration or overstatement for an extra effect in which the speaker can use hyperbole to add something extra to a situation in order to exaggerate his idea or speech. It is, like other figures of speech, used to express a negative or positive attitude of a specific unit of language. Thus, this paper is set against a background of using hyperbole concerning two main fields (advertisements and propaganda). So, the use of hyperbole will be implied by analyzing them concerning their meaning) literal and non-literal).  Methodology of this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
32nd Annual Meeting North American Skull Base Society
Surgical Reexploration of a Cerebral Arteriovenous Malformation Remnant: Literature Review and Illustrative Case
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A review on Active Constituents and Pharmacological Effects of Eriobotrya Japonica Lindl. (Loquat)
...Show More Authors

Eriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in  Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses.  In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (10)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
A sensitive spectrophotometric determination of tadalafil in pharmaceutical preparations and industrial wastewater samples
...Show More Authors

A simple, accurate, precise, rapid, economical and a high sensitive spectrophotometric method has been developed for the determination of tadalafil in pharmaceutical preparations and industrial wastewater samples, which shows a maximum absorbance at 204 nm in 1:1 ethanol-water. Beer's law was obeyed in the range of 1-7?g/ mL ,with molar absorptivity and Sandell ? s sensitivity of 0.783x105l/mol.cm and 4.97 ng/cm2respectively, relative standard deviation of the method was less than 1.7%, and accuracy (average recovery %) was 100 ± 0. 13. The limits of detection and quantitation are 0.18 and 0.54 µg .ml-1, respectively. The method was successfully applied to the determination of tadalafil in some pharmaceutical formulations

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 27 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review Article of Streptococcus Pyogenes Infection: Rick Factors, Prevention and Management Strategies
...Show More Authors

الخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref