Preferred Language
Articles
/
nxYrt4cBVTCNdQwCk14q
Sarin chemical warfare agent detection by Sc-decorated XN nanotubes (X = Al or Ga)
...Show More Authors

In order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNNT toward SN compare to AlNNT. Also, the recovery time for SN to be desorbed from the Sc@GaNNT surface was found to be short, i.e., 4.4 s. Based on the energy decomposing analysis, the interaction between the SN and metal@nanotubes was of electrostatic nature, which is also called a cation-lone pair interaction.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Ieee Photonics Journal
Di-Iron Trioxide Hydrate-Multi-Walled Carbon Nanotube Nanocomposite for Arsenite Detection Using Surface Plasmon Resonance Technique
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Detection of some auto antibodies of Celiac disease in Sera of patients with Chronic Hepatitis B virus
...Show More Authors

To determine the relationship between chronic hepatitis B virus and autoimmune celiac disease, seventy five patients with chronic hepatitis B virus of ages (8-70) years have been investigated and compared to 50 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA and IgG by ELISA test and anti-endomysial antibodies IgA and IgG by IIFT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P< 0.01) .The prevalence of antiTtG IgA and IgG was 14.67% and 12.0% respectively.There was a highly significant difference (P<0.01) when compared between studied groups .While the prevalence of anti-en

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems
...Show More Authors

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Mon Feb 03 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Developing of Bacterial Mutagenic Assay System for Detection of Environmental and Food MutagensV – Using Anticancer Drug Cyclophosphamide
...Show More Authors

G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Chemistry &amp; Chemical Technology
Turbidimetric Determination of Mebeverine Hydrochloride in Pharmaceutical Formulations Using Two Consecutive Detection Zones under Continuous Flow Conditions
...Show More Authors

A simple, low cost and rapid flow injection turbidimetric method was developed and validated for mebeverine hydrochloride (MBH) determination in pharmaceutical preparations. The developed method is based on forming of a white, turbid ion-pair product as a result of a reaction between the MBH and sodium persulfate in a closed flow injection system where the sodium persulfate is used as precipitation reagent. The turbidity of the formed complex was measured at the detection angle of 180° (attenuated detection) using NAG dual&Solo (0-180°) detector which contained dual detections zones (i.e., measuring cells 1 & 2). The increase in the turbidity of the complex was directly proportional to the increase of the MBH concentration

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Detection of Shallow Cavities Using 3D Resistivity Technique in a Small Site Near Haditha City, Western Iraq
...Show More Authors

     Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref