Preferred Language
Articles
/
ijs-3917
Network Authentication Protocol Based on Secure Biometric NIDN
...Show More Authors

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the cost of consulting services under the traditional cost approach and the performance-based costing technique and its impact on achieving profits : Applied research in the advisory office of Al-Khwarizmi College of Engineering - University of Baghdad
...Show More Authors

Abstract:

                    This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Designing a Proposed Educational Program Based on Augmented Reality Technology and Measuring Its Effectiveness in Developing the Skills of Research and Historical Imagination Among Students of the Humanities Track in The Secondary Stage in the City of Mak
...Show More Authors

The current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Sensing Performance of Modified Single Mode Optical Fiber Coated With Nanomaterials-Based Ammonia Sensors Operated in the C-Band
...Show More Authors

View Publication
Scopus (13)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Efficient Cloud-Based Resource Sharing Through Multi-Tenancy and Load Balancing: An Exploration of Higher Education and Digital Libraries
...Show More Authors

      Cloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Nanomedicine: Nanotechnology, Biology And Medicine
Listeria innocua Dps as a nanoplatform for bioluminescence based photodynamic therapy utilizing Gaussia princeps luciferase and zinc protoporphyrin IX
...Show More Authors

View Publication Preview PDF
Scopus (19)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Farmacia
SOLUPLUS AND SOLUTOL HS-15 OLMESARTAN MEDOXOMIL NANOMICELLE BASED ORAL FAST DISSOLVING FILM: IN VITRO AND IN VIVO CHARACTERIZATION
...Show More Authors

Olmesartan medoxomil (OM) has low bioavailability and limited solubility. To enhance bioavailability, fast dissolving films (FDF) with mixed micelles of soluplus (SPL) and solutol HS15 (STL H15) were developed using solvent casting. The optimised formula, FM2, used polyvinyl alcohol (PVA) and showed high entrapment efficiency, rapid disintegration, and significant improvement in OM bioavailability compared to the market tablet (Olmetec®). FM2 also demonstrated stability and potential for enhanced drug delivery.

Publication Date
Fri May 12 2023
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
SYNTHESIS, CHARACTERIZATION, ANTIMICROBIAL STUDIES, AND MOLECULAR DOCKING STUDIES OF TRANSITION METAL COMPLEXES FORMED FROM A BENZOTHIAZOLE-BASED AZO LIGAND
...Show More Authors

The azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Real Time <i>in Situ</i> Remote Monitoring for Cladding Modified SMF Integrating Nanocomposite Based Ammonia Sensors Deploying EDFA
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Comparison between Reference Infliximab (Remicade) and its Biosimilar (Remsima) in Patients with Ankylosing Spondylitis: A Field-based Pharmacoeconomic Study
...Show More Authors

Background: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.

Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.

Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref