Preferred Language
Articles
/
ijp-930
Influence of Gold Concentration on the Main Detection Parameters of Ge-Au Photoconductive Detector
...Show More Authors

Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Annals Of Parasitology
Evaluation the therapeutic efficacy of different concentration of amphotericin B drug in mice infected with visceral leishmaniosis
...Show More Authors

Liposomal amphotericin B (Amph B) has been used effectively to treat leishmaniosis, in spite of its high toxicity appeared in some patients. In our study, Amph B was administered in Leishmania donovani that infected BALB/c male mice using different concentrations to evaluate its efficacy challenge against infection as well as its effect in modulating immunity of the host. We observed that low doses with short duration of Amph B as a therapy regime significantly enhanced the induction of Th1 cytokine (INF-γ), but suppressed Th2 cytokine (IL-10) production. Groups of mice infected with L. donovani and treated with Amph B showed clearly increasing in INF-γ level and reduction in IL-10 level in concentration (3, 4, 5 mg/ml/kg) with best resul

... Show More
Scopus (1)
Scopus
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The influence of the political and social socialization in the trend towards extremism
...Show More Authors

The research deals with the impact of the nature of social and political formation in the orientation towards extremism through tracking the institutions and beliefs that the individual is going through. The role of the family, the group, the school, education, and religion has been touched upon in acquiring the trends of extremism, whether publicly or covertly, Focusing on the social and economic contexts that are an incubator environment for extremism supported by the form of the group and the beliefs it espouses, whether direct through religion or indirectly through the nature of education, this study relied on political literature that addressed this The topic, which focused on the phenomenon of extremism that swept the world recentl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
The influence of partial substation of antimony & lanthanum oxides on electrical and structural properties for the superconductor compound Bi2-xSbxBa2Ca2-yLayCu3O10+δ
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Jul 04 2016
Journal Name
University Of Plymouth
‘History Engraved on his Shoulder’: A Comparative Study of the Influence of British First World War Poetry on Post 1980 Iraqi War Poetry "embargoed indefinitely"
...Show More Authors

Abstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Antibacterial Activity of Synergistic Effect of colicin and Gold Nanoparticles against <i>Klebsiella pneumonia</i>
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Nanomedicine Research Journal
Gold and Silver Nanoparticles with Modified Chitosan /PVA : Synthesis, Study The Toxicity and Anticancer Activity
...Show More Authors

The new novel polymers nanocomposites based modified chitosan (CS) blending with polyvinyl alcohol (PVA) and coated gold or silver nanoparticles (AuNPs), AgNPs) were synthesized from many sequence reactions as presented in (Scheme1, 2 and 3). By utilizing 1H-NMR spectroscopy, FTIR, and Field Emission Scanning electron microscope , the synthesized compounds have been identified. Molecular docking is studied, where operations are used to predict the binding status of compounds with the enzyme and to calculate the free energy (ΔG) of the compounds prepared. Also, the antibacterial activity regarding the synthesized compounds against two resistant pathogenic bacteria (G+) S. aureus and E. coli (G-) was examined in vitro compare with standard a

... Show More
Publication Date
Thu Jul 25 2019
Journal Name
Journal Of Plant Protection Research
First report of phytoplasma detection on sand olive, cowpea and alfalfa in Iraq
...Show More Authors

View Publication Preview PDF
Scopus (19)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Mar 21 2020
Journal Name
Journal Of Engineering
Development of Iraqi license plate recognition system based on Canny edge detection method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo

... Show More
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication