Preferred Language
Articles
/
9xeRAI4BVTCNdQwCRywO
Five-year retrospective hospital-based study on epidemiological data regarding human leishmaniasis in West Kordofan state, Sudan
...Show More Authors

Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (36)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Oct 24 2022
Journal Name
Energies
Double-Slope Solar Still Productivity Based on the Number of Rubber Scraper Motions
...Show More Authors

In low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 28 2025
Journal Name
Al–bahith Al–a'alami
Tweets of Iraqi Political Leaders Regarding The Movement to Form The Governmet Through Twitter (From 3rd Septemper 2018 To 3rd Septemper 2019)
...Show More Authors

This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Assessment of Awareness And Knowledge among Medical Students Regarding Radiation Exposure from Common Diagnostic Imaging Procedures: Radiation exposure awareness among medical students
...Show More Authors

Objective: to assess the awareness and knowledge of our medical students regarding dose levels of imaging procedures and radiation safety issues, and to conclude how the curriculum of clinical radiology in the college medical program impacts such knowledge.

Subjects and methods:  this is a cross-sectional study conducted among 150 medical students in Alkindy College of Medicine between January 2021 to July 2021, regardless of their age or gender. The study included six grades according to the year 2020-2021. A questionnaire consisting of 12 multiple-choice questions was conducted via an online survey using Google Forms. The questions were divided into two parts

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Over expression of Her- 2 neu in ovarian surface epithelial carcinoma in a sample of Iraqi patient at Al-kindy Teaching Hospital.
...Show More Authors

Background: Although expression of the HER-
2/neuoncogene may be of some prognostic importance
in advanced ovarian cancer, its role in early-stage
disease has not been established. The current study
examined the prevalence and significance of HER-
2/neu expression in different grades of different types
of surface epithelial ovarian carcinoma.
Methods: Thirty eight female patients with surface
epithelial ovarian cancer were included in this study.
The blocks of corresponding formalin fixed, paraffinembedded
ovarian biopsies were retrieved from the
archives and hematoxylin-eosin slides of each ovarian
biopsy were reviewed and marked their grades of
differentiation , then a new sections from each sampl

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 25 2018
Journal Name
Al-kindy College Medical Journal
Prevalence and risk factors for hepatitis C virus in Beta thalassemic patients attending blood diseases center in Ibn- AL -Baladi Hospital, Baghdad
...Show More Authors

Background: Thalassemias are a group of heterogeneous genetic disorders, in which the rate of production of hemoglobin is partially or completely suppressed due to reduced rate of synthesis of α or β- chain

Objectives: to estimate the prevalence of Hepatitis C infection among B thalassemia patients attending Ibn-AL-Baladi center of blood diseases in AL-Sader city, in AL-Resafa Quarter of Baghdad and to determine the possible risk factors.

Type of the study: Cross- sectional study.

Methods: A cross sectional study conducted on B Thalassemia patients attending the blood diseases center in Ibn-AL-Baladi hospital during the period from 1st

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref