Preferred Language
Articles
/
4BaEvooBVTCNdQwCVKRl
Alpha clustering preformation probability in even-even and odd-A<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e3355" altimg="si39.svg"><mml:msup><mml:mrow /><mml:mrow><mml:mn>270</mml:mn><mml:mo>−</mml:mo><mml:mn>317</mml:mn></mml:mrow></mml:msup></mml:math>(116 and 117) using cluster formation model and the mass formulae : KTUY05 and WS4
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 01 2021
Journal Name
Biochemical & Cellular Archives
Impacts of Starvation Stress on Biofilm Formation and expression of Virulence Genes in Mono-and Mixed-species cultures of Pseudomonas Aeruginosa and Staphylococcus aureus
...Show More Authors

Staphylococcus aureus and Pseudomonas aeruginosa are the major globally distributed pathogens, which causes chronic and recalcitrant infections due to their capacity to produce biofilms in large part. Biofilm production represents a survival strategy in these species, allowing them to endure environmental stress by altering their gene expression to match their own survival needs. In this study, we co-cultured different clinical isolates of S. aureus and P. aeruginosa as mono- and mixed-species biofilms in a full-strength Brain Heart Infusion Broth (BHI) and in a 1000-fold diluted Brain Heart Infusion Broth (BHI/1000) using Microtiter plate assay and determination of colony-forming units. Furthermore, the effect of starvation stress on the e

... Show More
Scopus (2)
Scopus
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
The efficiency of cluster analysis to analyzing medical image of Covid-19 patient by using K-means algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analytical Study Compared Between Poisson and Poisson Hierarchical Model and Applied in Healthy Field
...Show More Authors

Through this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Determination of Phosphodiesterase Type 5 Enzyme (PDE-5) Inhibitors and Analogues as Adulterants in Selected Herbal Products using Gas Chromatography–Electron Impact-Mass Spectrometer (GC-EI-MS)
...Show More Authors

       Sildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref