Preferred Language
Articles
/
JBinkZQBVTCNdQwCmR2A
A clinical-statistical study on COVID-19 infection and death status at the Alshifaa Healthcare Center/ Baghdad
...Show More Authors

Background: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 were infected and the rest of them were not. Results: The study showed that males’ infection and death cases were higher than females by more than double, despite the population ratios of the two genders being almost equal. Furthermore, as the age of patients is older, the chance of death is higher. Death cases were lower in December than the previous three months, which could be attributed to lower infection cases compared with the previous months. Conclusions: We can conclude that the peak of infected ages was the same as the other countries. Hence, the number of checked children was low, while we have the peak around the 40s and 50s. Females’ death cases were much less than males, which could be attributed to the genetic influence and the higher responsibility that females showed than males to prevent the disease’s spreading.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 29 2022
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF SUPPLEMENTARY IRRIGATION SYSTEM ON WHEAT PRODUCTION EFFICIENCY USING A STOCHASTIC FRONTIER ANALYSIS
...Show More Authors

This study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Fri Apr 29 2022
Journal Name
Sar Journal Of Surgery
Variation of Sphenoid Sinus Pneumatization on CT scan in A Sample of Iraqi Patients
...Show More Authors

Background: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Al-salam Journal For Medical Science
A review of recent developments in pharmaceutical chemistry on biological evolution of tetrazole derivatives
...Show More Authors

This review sums up the developments in the biological activity of tetrazole active derivatives in recent days. Some of the deliberated derivatives of tetrazole are at present actively scientifically studied; some of them have biological activity that enables them to be studied further in the future as a drug for various biological activities. This review seeks to offer a comprehensive analysis of the efficacy and clinical advantage of biological activity for tetrazole derivatives.

View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Experimental Investigating of Unsupported Excavation Considering Its Effect on a Nearby Axially Loaded Pile
...Show More Authors

An experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d

... Show More
View Publication Preview PDF