Preferred Language
Articles
/
JBaoDIcBVTCNdQwCPzMJ
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Analysis and Development of Customer Billing Telephony System
...Show More Authors

The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Chemtech Research
Biological Assessment, Heamatological Study, and Environmental Detection of Eugenol
...Show More Authors

Eugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sat Feb 01 2014
Journal Name
World Journal Of Pharmaceutical Sciences
Detection of JAK2V617F Mutation and Serum Levels of Alkaline Phosphatase and Lactate Dehydrogenase in Chronic Myelogenous Leukemia.
...Show More Authors

Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a

... Show More
Preview PDF
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
Impact of D.B.M. Best practices on Community Rehabilitation Projects
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Al-nahrain University Science
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (68)
Crossref (61)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Molecular Liquids
The development of new homogenous and heterogeneous catalytic processes for the treatment of low grade palm oil
...Show More Authors

Low grade crude palm oil (LGCPO) presents as an attractive option as feedstock for biodiesel production due to its low cost and non-competition with food resources. Typically, LGCPO contains high contents of free fatty acids (FFA), rendering it impossible in direct trans-esterification processes due to the saponification reaction. Esterification is the typical pre-treatment process to reduce the FFA content and to produce fatty acid methyl ester (FAME). The pre-treatment of LGCPO using two different acid catalysts, such as titanium oxysulphate sulphuric acid complex hydrate (TiOSH) and 5-sulfosalicylic acid dihydrate (5-SOCAH) was investigated for the first time in this study. The optimum conditions for the homogenous catalyst (5-SOCAH) wer

... Show More
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Plant Archives
Development, validation, and pharmaceutical dosage forms application of hydrophilic interaction chromatography assay for the quantification of theophylline
...Show More Authors

The present work establishes and validates HILIC strategies simple, accurate, exact and precise in pure form and inpharmaceutical dosage for separating and determining theophylline. These methods are developed on HILIC theophyllineseparation in columns ZIC2 and ZIC3. The eluent was prepared by mixing buffer (20% sodium acetate-40 mM, pH 5.5), 80%acetonitrile. The flow rate is 0.8 mL/min, with gradient elution and UV detection at 270 nm. In the ZIC2 and ZIC3 columns oftheophylline determining, the concentration range was 0.01-4μg.ml-1. The lower limit of detection and quantification fortheophylline were determined as 0.130, 0.190 μg.ml-1 and accuracy were 99.70%, 99.58% on ZIC2 and ZIC3, respectively. TheHILIC methods developed and validat

... Show More
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref