Preferred Language
Articles
/
lBiP3ZYBVTCNdQwC-od_
Fabrication of Functionalize Reduce Graphene Oxide and Its Application in Ampicillin Detection
...Show More Authors

Graphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying electrode to examine. The results show good selectivity at pH2 to the ampicillin and a redox reaction of the β- lactam group of the antibiotic.

Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Physics
Effect of pH on the Structural and Optical Properties of Cadmium oxide Thin Films Prepared Using the Successive Ionic Layer Adsorption and Reaction (SILAR) Method
...Show More Authors

Cadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values ​​(7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 29 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.: APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.
...Show More Authors

This study aims to Statement of the relationship between Total Quality Management philosophy and Organizational performance from the point of view of the internal customer. A comparison has been made between two companies, one of which applies the requirements of TQM well and the other does not apply these requirements as the (General Company for Electrical Industries/ Diyala) and (General Company for Electrical Industries/ Baghdad) to conduct the search, During the questionnaire prepared for this purpose and distributed to a sample of 30 employees in the General Company for Electric Industries/ Diyala and (20) employees of the General Company for Electrical Industries/ Baghdad. Their answers were analyzed using a simple correlation coef

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Sun Oct 03 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Application of topological concepts to the investigation of COVID-19 (modified) symptoms
...Show More Authors

We examine 10 hypothetical patients suffering from some of the symptoms of COVID 19 (modified) using topological concepts on topological spaces created from equality and similarity interactions and our information system. This is determined by the degree of accuracy obtained by weighing the value of the lower and upper figures. In practice, this approach has become clearer.

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Application of Artificial Neural Network for Predicting Iron Concentration in the Location of Al-Wahda Water Treatment Plant in Baghdad City
...Show More Authors

Iron is one of the abundant elements on earth that is an essential element for humans and may be a troublesome element in water supplies.  In this research an AAN model was developed to predict iron concentrations in the location of Al- Wahda water treatment plant in Baghdad city by water quality assessment of iron concentrations at seven WTPs up stream Tigris River. SPSS software was used to build the ANN model. The input data were iron concentrations in the raw water for the period 2004-2011. The results indicated the best model predicted Iron concentrations at Al-Wahda WTP with a coefficient of determination 0.9142. The model used one hidden layer with two nodes and the testing error was 0.834. The ANN model coul

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Cyber Crime and its Risks on Children
...Show More Authors

Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Grammatical separation between   Passion and its intake
...Show More Authors

This study sheds light on the syndromes (grammatical pairs) in the section of sympathy, especially the affection and sympathy according to the normative rule governed by the synthetic correlation of the elements of the Arabic sentence and their structural composition, which leads to a verbal presumption governing their association with each other (called).
One of the syndromes of the grammarians is that which is between the emotion and his income, so they follow their functional and structural conditions, and they have also noticed a phenomenon that leads to their incompatibility and prevents their direct contact through the occurrence of a separation between them resulting in their separation, which is called separation. Grammar).

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Global tolerance and its impact on peace
...Show More Authors

The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.

... Show More
View Publication
Crossref
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Asking for permission and its legal ruling
...Show More Authors

Praise be to God, Lord of the Worlds, and the best blessings and peace be upon our master Muhammad and all his family and companions, and those who follow them with goodness until the Day of Judgment. . And after:

God created man in the best manner, and subjugated the universe to him and favored him over the rest of creation when he gave him a mind to contemplate and know how to distinguish between the harmful and the beneficial, the bad and the good, in order to exploit him in achieving the meaning of worship, because it is the highest goal of his creation. God Almighty said (And I did not create the jinn and mankind. Except that they worship them.” [Al-Dhariyat: 56]

If knowing what is harmful from what is beneficial a

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF