Preferred Language
Articles
/
EIYproYBIXToZYAL3KTJ
Application of MQ-Sensors to Indoor Air Quality Monitoring in Lab based on IoT
...Show More Authors

Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Evaluation of Electrolytes Disturbances in Iraqi Chronic Myeloid Leukemia Patients treated with Nilotinib with Monitoring of Response by FISH Study
...Show More Authors

Chronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the presence Philadelphia chromosome (Ph) which was created by a reciprocal translocation between chromosomes 9 and 22 (t [9;22] [q34;q11]. The approval of the 2nd generation TKI ( Nilotinib) takes the treatment of CML patients into new erea with more efficiency and mild to moderate adverse effects. This study was aimed at evaluation of molecular cytogenetic response by (FISH) for Nilotinib in Iraqi patients with assessment for electrolytes disturbances of Nilotinb by measuring a panel of electrolyte (Na+, K+, Ca++, PO4--- and Mg++) , where thirty Iraqi patients with CML who have resistance or no response to Imatinib treatment, attending to Baghdad Teaching Ho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Iraqi Geological Journal
The Effect of Nickel, Vanadium, Asphaltene, NSO and Sulfur on Crude Oil Quality
...Show More Authors

The Mishrif reservoir (Cenomanian - Turonian) in the Z, H, B and N oilfields in southern Iraq was investigated to clarify how nickel, vanadium, asphaltene, NSO and sulfur content affect the crude oil quality. The GC-Mass and ICP-MS analyses were used to provide fruitful hydrocarbon results. Classification of crude oil based on API gravity broadly indicates the oil's density and general properties. Typically, lighter crude oils are easier to refine, yield higher percentages of valuable products such as gasoline and diesel, and have a higher market value. Heavier crude oils require more processing and may yield more residual products, such as heavy fuel oil and asphalt. The Mishrif crude oil was classified as a medium sour crude oil c

... Show More
View Publication
Scopus (7)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting IPSASs and its impact on the quality of financial reporting and performance evaluation in Iraqi government units
...Show More Authors

Abstract

     Performance evaluation is of great importance in all countries of the world, because it has a prominent and effective role in determining the efficiency and effectiveness of the optimal use of available resources, which are rare and important in achieving the desired objectives. With the continued growth of public spending and the limited resources, the State seeks to achieve its objectives through its units with minimal expenditure or deficit, rationality and wastefulness in the spending. In many countries, particularly developing countries, reforms are made in the public sector to achieve that goal through the adoption of IPSAS, which is reflected in the developmen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Sensors And Actuators B: Chemical
Fabrication and Characterizations of a Novel Etched-tapered Single Mode Optical Fiber Ammonia Sensors Integrating PANI/GNF Nanocomposite
...Show More Authors

View Publication
Scopus (38)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More