* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
This work describes, selenium (Se) films were deposited on clean glass substrates by dc planar magnetron sputtering technique.The dependence of sputtering deposition rate of Se film deposited on pressure and DC power has been studied. The optimum argon pressure has range (4x10-1 -8x10-2 )mbar. The optical properties such as absorption coefficient (α) was determined using the absorbance and transmission measurement from UnicoUV-2102 PC spectrophotometer, at normal incidence of light in the wavelength range of 200-850 nm. And also we calculated optical constants(refractive index (n), dielectric constant (εi,r), and Extinction coefficient (κ) for selenium films.
KE Sharquie, AA Noaimi, HM Salmo, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2013 - Cited by 5
Constructed wetlands (CWs) are simple low-cost wastewater treatment units that use natural process to improve the effluent water quality and make it possible for its reuse.in this study used the horizontal flow system for the tertiary treatment of wastewater effluent from secondary basins at Al-Rustamiya wastewater treatment plant / old project / Baghdad / Iraq. the Phragmites Australis plant was used for wastewater treatment and the horizontal subsurface flow system was applied. the experimental study was carried out in February 2020 to October 2020. the parameters were monitored for a period of five weeks, Concentration-based average removal efficiencies for HSSF-CW were COD,53% [NO
KE Sharquie, AA Noaimi, SJ Murtada…, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 4
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreMultiple sclerosis (MS) is a chronic, inflammatory demyelinating disease of central nervous system with complex etiopathogenesis that impacts young adults (Lee et al., 2015), and MS impacts younger and middle aged character and leads to a range of disabilities that can alter their daily routines (Yara et al, 2010). Although, the exact cause of MS is still undetermined, the disease is mediated by adaptive immunity through the infiltration of T cells into the central nervous system (Bjelobaba et al, 2017). MS causes the Focal neurological symptomsand biochemical changes in the molecular level and the variation of neural cells such as loss or alteration of sensation, motor function, visible signs such as blurred vision or transient blindness,
... Show More