Preferred Language
Articles
/
ijp-1092
Cytotoxic Activity of CuO NPs Prepared by PLAL Against Liver Cancer (Hep-G2) Cell Line and HdFn Cell Lines
...Show More Authors

A simple physical technique was used in this study to create stable and cost-effective copper oxide (CuO) nanoparticles from pure copper metal using the pulsed laser ablation technique. The synthesis of crystalline CuO nanoparticles was confirmed by various analytical techniques such as particle concentration measurement using atomic absorption spectrometry (AAS), field emission scanning electron microscopy (FE-SEM), the energy dispersive X-ray (EDX), and X-ray diffraction (XRD) to determine the crystal size and identify of the crystal structure of the prepared particles. The main characteristic diffraction peaks of the three samples were consistent. The corresponding 2θ is also consistent, and the cytotoxicity of the nanoparticles was also investigated. After 24 hours of exposure, the percentage of cytotoxicity was calculated. The maximum toxicity of Hep-G2 was 37.81% at the maximum concentration of (500) µg mL-1 after 24 hours of exposure. Also, the maximum toxicity of the normal cell line was 27.85% at a maximum concentration of (500) µg mL-1.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reducing the Pollutants from Municipal Wastewater by Chlorella Vulgaris Microalgae
...Show More Authors

In the present work, the pollutants of the municipal wastewater are reduced using Chlorella vulgaris microalgae. The pollutants that were treated are: Total organic carbon (TOC), Chemical oxygen demand (COD), Nitrate (NO3), and Phosphate (PO4). Firstly, the treatment was achieved at atmospheric conditions (Temperature = 25oC), pH 7 with time (1 – 48 h). To study the effect of other microorganisms on the reduction of pollutants, sterilized wastewater and unsterilized wastewater were used for two types of packing (cylindrical plastic and cubic polystyrene) as well as algae's broth (without packing), where the microalgae are grown on the packing then transported to the wastewater for treatment. Th

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The rule (The inference is not invalidated by its like)
...Show More Authors

In the name of of Allah the Merciful

Research Summary

This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).

The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Asocaial acceptance to ward slow learnes by their normal peers
...Show More Authors

هدفت الدراسة الحالية الى التعرف ما اذا كان هناك تقبل اجتماعي للتلاميذ بطيئي من قبل اقرانهم العاديين؟ وكذلك معرفة ما اذا كان هناك فروق ذات دلالة في التقبل الاجتماعي بين افراد عينة الدراسة على وفق المتغيرات الاتية:

أ- العمر (9-13)

ب- الجنس (ذكور –اناث)

ج- المرحلة الدراسية

د- الحالة الاقتصادية (جيدة –متوسطة –جيدة جدا)

    ولغرض تحقيق اه

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 06 2023
Journal Name
Environmental Monitoring And Assessment
Copper metal elimination from polluted soil by electro-kinetic technique
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jun 24 2018
Journal Name
2018 Aiaa/ceas Aeroacoustics Conference
Mimicking the serration effects on aerofoil by leading edge blowing
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Mon Oct 28 2013
Journal Name
Desalination And Water Treatment
Groundwater protection from cadmium contamination by zeolite permeable reactive barrier
...Show More Authors

This work studies the performance of zeolite permeable reactive barrier in removing cadmium from a contaminated shallow aquifer. Batch tests have been performed to characterize the equilibrium sorption properties of the zeolite in cadmium-containing aqueous solutions. A 1D numerical finite difference model has been developed to describe pollutant transport within groundwater taking pollutant sorption on the permeable reactive barrier (PRB), which is performed by Langmuir equation, into account. Numerical results show that the PRB starts to saturate after a period of time (~120 h) due to reduction of the retardation factor, indicating a decrease in the percentage of zeolite functionality. However, a reasonable agreement between model predict

... Show More
Scopus (38)
Crossref (24)
Scopus Clarivate Crossref