Preferred Language
Articles
/
JhZau4sBVTCNdQwCsNmI
Evaluating the performance of introduced varieties of maize (Zea Mays L.) and estimating some genetic parameters
...Show More Authors

Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Food Science And Technology
Evaluating the hydrophilic antioxidant capacity in different citrus genotypes
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 04 2023
Journal Name
Journal Of Techniques
Comparison Between the Kernel Functions Used in Estimating the Fuzzy Regression Discontinuous Model
...Show More Authors

Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Bridge Regression Model Estimating via Simulation
...Show More Authors

      The main problem when dealing with fuzzy data variables is that it cannot be formed by a model that represents the data through the method of Fuzzy Least Squares Estimator (FLSE) which gives false estimates of the invalidity of the method in the case of the existence of the problem of multicollinearity. To overcome this problem, the Fuzzy Bridge Regression Estimator (FBRE) Method was relied upon to estimate a fuzzy linear regression model by triangular fuzzy numbers. Moreover, the detection of the problem of multicollinearity in the fuzzy data can be done by using Variance Inflation Factor when the inputs variable of the model crisp, output variable, and parameters are fuzzed. The results were compared usin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATING THE QUALITY OF IMPORTED AND LOCAL FLOUR IN TERMS OF QUALITY WITH IRON AND FOLIC ACID AND ITS COMPLIANCE WITH IRAQI STANDARD: EVALUATING THE QUALITY OF IMPORTED AND LOCAL FLOUR IN TERMS OF QUALITY WITH IRON AND FOLIC ACID AND ITS COMPLIANCE WITH IRAQI STANDARD
...Show More Authors

Food fortification has an important and necessary role in compensating for the shortage of nutritional micronutrients, especially in developing and least developed countries. So, 12 samples of flour available in the local market, whether imported or locally produced flour, were obtained during 2019. The amount of base metal of the necessary iron element in the flour models studied which are available in local markets, measured by spot testing and was compared with the values ​​that should be added according to the specification Iraqi standard. Results revealed the qualitative evaluation of iron in locally produced flour does not conform to the Iraqi standard and is almost free of any reinforcement. While the percentage of imp

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Biochem. Cell. Arch.
ANATOMICAL AND CHEMICAL STUDY OF ALTHEAE OFFICINALIS L. SPREAD IN THE NORTH OF IRAQ
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Determining ACE-2 Level and Some Relevant Biochemical Parameters and studying the effect of Gender in Iraqi Diabetic Patients with Glomeruli and Renal Tubules Fibrosis as Early Prediction Marker
...Show More Authors

     Diabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 08 2018
Journal Name
Journal Of Al-nahrain University
CALCULATION OF THE PARAMETERS FOR ATMOSPHERICMODEL FOR THE EARTH
...Show More Authors

Publication Date
Sat Jan 23 2016
Journal Name
Journal University Of Kerbala
Synthesis and Characterization of Some Metal Complexes of [2-chloro-N-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1Hpyrazol-4-ylcarbamothioyl)acetamide] (L)
...Show More Authors

A new ligand [ 2-chloro-N- (1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro -1H-pyrazol- 4- ylcarbamothioyl)acetamide](L) was synthesized by reacting the Chloro acetyl isothiocyanate with 4-aminoantipyrine,The ligand was characterized by(C HNS) elemental microanalysis and the spectral measurements including Uv-Vis ,IR ,1H and13C NMR spectra, some transition metals complex of this ligand were prepared and characterized by Uv-Vis, FT-IR spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(L)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedra

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Construction Engineering And Management
Measuring and Evaluating Safety Maturity of Construction Contractors: Multicriteria Decision-Making Approach
...Show More Authors

View Publication
Scopus (69)
Crossref (55)
Scopus Clarivate Crossref