Preferred Language
Articles
/
pRgD6pYBVTCNdQwCEoln
Synthesis and liquid crystal properties of a new class of calamitic mesogens based on twin 1,3,4-thiadiazole derivatives with imine linkage
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 31 2015
Journal Name
Journal Of Al-qadisiyah For Pure Science
synthesis ,spectral studies and antimicrobial evalution of 6,6-(1,2-benzenediazo)bis(3-amino benzoic acid) complexes with some metal ions
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
مؤتمر النسوي الثالث / كلية العلوم للبنات
Synthesis , Characterization and study of Biological Activities of Mixed Ligand-Complexes of Saccharin and Trimethoprim with Ni(II),Co(II),Cu(II), Hg(II) and Cd(II)
...Show More Authors

Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Teaching Strategy Based on the Cognitive Model of Daniel in the Development of Achievement and the Motivation of learning the School Mathematics among the Third Intermediate Grade Students
...Show More Authors

This research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
CALCULATION OF EXCESS MOLAR VOL-UMES OF SOME TERNARY LIQUID MIX-TURES AT 303.15 K
...Show More Authors

Excess molar volumes of five ternary mixtures of 2- methoxy ethanol(1) +butyl acetate(2)+benzene(3), +toluene(3), +chlorobenzene(3), +bromobenzene(3), and +nitrobenzene(3) have been measured at 303.15K. The excess molar volume exhibited positive deviation over the entire range of composition in the systems 2-methoxy ethanol(1)+ butyl acetate(2)+ benzene(3),+toluene(3) and sigmoid behavior in the case of the remaining systems. Flory's statistical theory have been extended to predict the excess molar volumes of the five ternary mixtures at 303.15 k over a wide range of composition . An excellent agreement has been found between the experimental and theoretical excess molar volumes , both in magnitude and sign .

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Diyala Journal For Pure Sciences
Synthesis, Characterization and Biological Activity for Complexes VO(II), Mn(II), Co(II) and Ni(II) With New Multidentate Ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4- ylimino)acetic Acid][H2L] type (N2).
...Show More Authors

In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon

... Show More