Preferred Language
Articles
/
rhaw3osBVTCNdQwCI-Jf
Micro-solid phase extraction with liquid chromatography–tandem mass spectrometry for the determination of aflatoxins in coffee and malt beverage
...Show More Authors

A single step extraction-cleanup procedure using porous membrane-protected micro-solid phase extraction (μ-SPE) in conjunction with liquid chromatography–tandem mass spectrometry for the extraction and determination of aflatoxins (AFs) B1, B2, G1 and G2 from food was successfully developed. After the extraction, AFs were desorbed from the μ-SPE device by ultrasonication using acetonitrile. The optimum extraction conditions were: sorbent material, C8; sorbent mass, 20 mg; extraction time, 90 min; stirring speed, 1000 rpm; sample volume, 10 mL; desorption solvent, acetonitrile; solvent volume, 350 μL and ultrasonication period, 25 min without salt addition. Under the optimum conditions, enrichment factor of 11, 9, 9 and 10 for AFG2, AFG1, AFB2 and AFB1, respectively were achieved. Good linearity and correlation coefficient was obtained over the concentration range of 0.4–50 ng g−1 (r2 0.9988–0.9999 …

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Antimicrobial activities of some new heterocyclic compounds bearing imidazo[2,1-b]benzothiazole moiety
...Show More Authors

View Publication
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Forced- Convection from Horizontal Rectangular Fins Array into Air Duct
...Show More Authors

    In this work, an experimental study has been done to expect the heat characteristics and performance of the forced-convection from a heated horizontal rectangular fins array to air inside a rectangular cross-section duct. Three several configurations of rectangular fins array have been employed. One configuration without notches and perforations (solid) and two configurations with combination of rectangular-notches and circular-perforations for two various area removal percentages from fins namely 18% notches-9% perforations and 9% notches-18% perforations are utilized.  The rectangular fins dimensions and fins number are kept constant. The fins array is heated electrically from the base

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Optical Fiber Technology
Highly sensitive measurement of surrounding refractive index using tapered trench–assisted multicore fiber
...Show More Authors

View Publication
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Civil Engineering Journal
Post-Fire Behavior of Post-Tensioned Segmental Concrete Beams under Monotonic Static Loading
...Show More Authors

This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,

... Show More
Crossref (1)
Crossref
Publication Date
Fri Sep 03 2021
Journal Name
Buildings
Structural Efficiency of Hollow Reinforced Concrete Beams Subjected to Partial Uniformly Distributed Loading
...Show More Authors

Reinforced concrete (RC) beams containing a longitudinal cavity have become an innovative development and advantage for economic purposes of light-weight members without largely affecting their resistance against the applied loads. This type of openings can also be used for maintenance purposes and usage space of communication lines, pipelines, etc. RC beams are primarily loaded in the plane of the members, which are two-dimensional in a plane stress state and the dominant structural behaviours include bending, shear, or combination of both. In the present study, six numerical models of RC beams with and without openings were simulated by using commercial finite element software ANSYS to evaluate the structural behaviours of those b

... Show More
View Publication
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Jul 04 2018
Journal Name
Civil Engineering Journal
Finite Element Analysis of Concrete Beam under Flexural Stresses Using Meso-Scale Model
...Show More Authors

Two dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac

... Show More
Crossref (4)
Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oil Removal from Wastewater of Al-Bezerqan Crude Oil Fields by Air Flotation
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Mar 21 2020
Journal Name
Journal Of Engineering
Development of Iraqi license plate recognition system based on Canny edge detection method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo

... Show More