Preferred Language
Articles
/
uBiexZYBVTCNdQwCkoYh
Synthesis, Characterization, and Biological Evaluation for New Derivatives Based on 2Сhloro-N-[4-(5-phenyl-1,3,4-oxadiazol-2-yl)phenyl]acetamide
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (36)
Crossref (25)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Synthesis and Characterization of (Fe(II),Co(II),Ni(II) and Cu(II)) Complexes with Schiff Base derived from [benzoyl hydrazine] with [benzyl mono oxime]
...Show More Authors

The reaction of [Benzoyl hydrazine] with [Diphenyl mono oxime] and Glacial acetic acid was carried out in methanol gave a new tridentate ligand [Benzoic acid (2- hydroxyimino- 1, 2-diphyneylethylidene) - hydrazide]. This ligand was reacted with some metal ions (Fe(II), Co(II), Ni(II), and Cu(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(L)Cl2.H2O], where M= Fe(11), Co(11), Ni(11) and Cu(11) . All compounds were characterized by spectroscopic methods (I.R, UV-Vis), elemental microanalysis (C.H.N), atomic absorption, magnetic susceptibility, and conductivity measurements. From the obtained data the proposed molecular structures were suggested for the complexes of Fe (II), Co (II)

... Show More
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Synthesis and Characterization of (Fe(II),Co(II),Ni(II) and Cu(II)) Complexes with Schiff Base derived from [benzoyl hydrazine] with [benzyl mono oxime]
...Show More Authors

The reaction of [Benzoyl hydrazine] with [Diphenyl mono oxime] and Glacial acetic acid was carried out in methanol gave a new tridentate ligand [Benzoic acid (2-hydroxyimino- 1, 2-diphyneylethylidene) - hydrazide]. This ligand was reacted with some metal ions (Fe(II), Co(II), Ni(II), and Cu(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(L)Cl2.H2O], where M= Fe(11), Co(11), Ni(11) and Cu(11). All compounds were characterized by spectroscopic methods (I.R, UV-Vis), elemental microanalysis (C.H.N), atomic absorption, magnetic susceptibility, and conductivity measurements. From the obtained data the proposed molecular structures were suggested for the complexes of Fe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Characterization of Quartz and Calcite Particle size Presents in Local Dust Fell on Baghdad on June 2009
...Show More Authors

Dust samples have been collected from three areas in Baghdad during dust storm occurred in 18th of June 2009 to characterize elemental particle size and composition by different techniques. The x-ray diffraction detected six minerals those are calcite, and quartz, present as a major components, dolomite, kaolinite, gypsum and plagioclase present as miner components .EDX detected some normal elements presented in local soil except traces of lead , nickel, and chromium. The particle size analysis by a set of sieves have revealed that the majority particle distribution was between (32 and 45)μm . To isolate the aerosol size, PM10 buoyancy method of powder in water showed a signifying amounts of particulate size .Scheerer’s method was app

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors