Preferred Language
Articles
/
lBiP3ZYBVTCNdQwC-od_
Fabrication of Functionalize Reduce Graphene Oxide and Its Application in Ampicillin Detection
...Show More Authors

Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying electrode to examine. The results show good selectivity at pH2 to the ampicillin and a redox reaction of the β- lactam group of the antibiotic.

Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
College Of Basic Education Research Journal
Literal Translation and Its Impact on Political Terms Translation in Television Journalism
...Show More Authors

The research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Opción
Abnormal emotional behavior in children and its rela- tionship to televised violence
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Recantation By The Al-Zaher People And Its Effects in Derivation
...Show More Authors

nouns , because deriving these names will lead to eternity which is impossible, and restrict the derivation only in agent nouns from their verbs, and the adjective names from their adjectives with the condition of truth in derivation.
The derivation of “Allah” names was denied due to a creed thoughts, because saying that “Allah” names is derived will not describe the eternal essence of “Allah”, and if it were derived this will make “Allah” is a Compound from his essence and Attributes.
The Al-Zaher people had recant the derivation of the agent nouns by preventing the derivation of “Allah” names because it will make “Allah” is a Compound from his essence and Attributes.
The Al-Zaher people had recant from

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Strategic Intelligence and Its Relation to Fifth Preparatory Students’ Achievement in Mathematics
...Show More Authors

The research seeks to identify the correlation relationship between strategic intelligence and fifth preparatory students’ achievement in mathematics. To achieve this objective, stratified random sampling were used based on participants’ gender and the branch of study. The sample consisted of (200) male and female fifth preparatory students for both (literary and scientific branch) who were displaced to Arbil city in Iraq for the academic year 2016-2017. As for research tool, the researcher administered strategic intelligence test to the study sample in the second semester which was designed by Ibrahim (2017), it includes (30) items divided into five domains (predictability, organized thinking, future view, motivation, and pa

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Cultural harmony and its in contemporary Mexican painting: حمدية كاظم روضان المعموري
...Show More Authors

  We live in a world where cultures and visions overlap .. Therefore, every society seeks to create a harmonization that is in line with the data of those special cultures and reproduces those cultures and defines their paths. There are cultures based on historical action and experience and others that work on historical displacement, and art is one of the most important means of transmitting cultures and establishing their aesthetic harmony. This research is concerned with studying (cultural patterns and their representations in contemporary Mexican painting) and it falls into four chapters. The first chapter is devoted to explaining the research problem, its importance, the need for it, the goal of the research, and identifying th

... Show More
View Publication Preview PDF
Crossref