Preferred Language
Articles
/
9hewQJMBVTCNdQwCY89_
Carbon Dioxide Availability in Inlands Rivers Is Driven by Dissolved Organic Carbon, Not Warming: A Case Study of Tigris River
...Show More Authors

الانهار اصبحت مشبعة بثاني اوكسيد الكربون بشكل عالي وبذلك فهي تلعب دور مهم في كميات الكربون العالمية. لزيادة فهمنا حول مصادر الكربون المتوفرة في النظم البيئية النهرية، تم اجراء هذه الدراسة حول تأثير الكربون العضوي المذاب والحرارة (العوامل الرئيسية لتغير المناخ) كمحركات رئيسية لوفرة ثاني اوكسيد الكربون في الانهار. تم جمع العينات من خمسة واربعون موقع في ثلاثة اجزاء رئيسية لنهر دجلة داخل مدينة بغداد خلال فصلي الخريف والشتاء. اظهرت الدراسة ان جميع المتغيرات المدروسة (الحرارة، الأس الهيدروجيني، الكربون العضوي المذاب، وثاني اوكسيد الكربون) تتغير مع الوقت. كانت التغيرات في تركيز ثاني اوكسيد الكربون مرتبطة ايجابيا بالتغيرات في تركيز الكربون العضوي المذاب وليست بتغير درجات الحرارة. نتائجنا بشكل عام تشير الى ان الزيادة بتراكيز ثاني اوكسيد الكربون في الانهار هو نتيجة لزيادة المدخلات من الكربون العضوي المذاب. وبذلك نستنتج ان الزيادة في تراكيز الكربون العضوي المذاب في الأنهار مطلوبة كمصدر لثاني اوكسيد الكربون من خلال عمليات التنفس الميكروبي والتحلل الكيميائي.

Scopus Clarivate Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A lightweight AES Algorithm Implementation for Secure IoT Environment
...Show More Authors

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (17)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Glaucoma Diagnosis Based on Retinal Fundus Image: A Review
...Show More Authors

    Glaucoma is one of the most dangerous eye diseases. It occurs as a result of an imbalance in the drainage and flow of the retinal fluid. Consequently, intraocular pressure is generated, which is a significant risk factor for glaucoma. Intraocular pressure causes progressive damage to the optic nerve head, thus leading to vision loss in the advanced stages. Glaucoma does not give any signs of disease in the early stages, so it is called "the Silent Thief of Sight". Therefore, early diagnosis and treatment of retinal eye disease is extremely important to prevent vision loss. Many articles aim to analyze fundus retinal images and diagnose glaucoma. This review can be used as a guideline to help diagnose glaucoma. It presents 63 artic

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Mannich Bases: Synthesis, Pharmacological Activity, and Applications: A Review
...Show More Authors

      The Mannich reaction is one of the most important types of organic chemistry fundamental reactions. It is a crucial stage in the production of various medicines, natural goods, and industrial chemicals. Chemists' imaginations have always been piqued because of this. In general, the Mannich reactions can be used as part of a tandem reaction sequence to produce complex target molecules in an elegant and often easy manner. The following article examines and summarizes methods for synthesizing Mannich derivatives, in addition to offering a survey of recent advancements in several fields’ applications of the Mannich reaction, such as biological applications, antimicrobial activity, anticancer activity, anti-inflammation and antio

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors

Publication Date
Thu Mar 09 2017
Journal Name
Sensors
A Multimodality Hybrid Gamma-Optical Camera for Intraoperative Imaging
...Show More Authors

The development of low profile gamma-ray detectors has encouraged the production of small field of view (SFOV) hand-held imaging devices for use at the patient bedside and in operating theatres. Early development of these SFOV cameras was focussed on a single modality—gamma ray imaging. Recently, a hybrid system—gamma plus optical imaging—has been developed. This combination of optical and gamma cameras enables high spatial resolution multi-modal imaging, giving a superimposed scintigraphic and optical image. Hybrid imaging offers new possibilities for assisting clinicians and surgeons in localising the site of uptake in procedures such as sentinel node detection. The hybrid camera concept can be extended to a multimodal detec

... Show More
View Publication
Scopus (24)
Crossref (25)
Scopus Clarivate Crossref