Preferred Language
Articles
/
JxYNBYcBVTCNdQwCYi4b
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Estimation of the reliability function of the Rayleigh distribution using some robust and kernel methods
...Show More Authors
Abstract<p>The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction By Classical and Flow Zone Indictor (FZI) Methods for an Iraqi Gas Field
...Show More Authors

The permeability is the most important parameter that indicates how efficient the reservoir fluids flow through the rock pores to the wellbore. Well-log evaluation and core measurements techniques are typically used to estimate it. In this paper, the permeability has been predicted by using classical and Flow zone indicator methods. A comparison between the two methods shows the superiority of the FZI method correlations, these correlations can be used to estimate permeability in un-cored wells with a good approximation.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Maximum Likelihood and Bayesian Methods For Estimating The Gamma Regression With Practical Application
...Show More Authors

In this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
World Journal Of Experimental Biosciences
Detection of anti-Helicobacter pylori antibodies in sera of women with recurrent spontaneous abortion
...Show More Authors

To determine the relationship between Helicobacter pylori infection and reproduction disorder (recurrent spontaneous abortion), twenty women patients who undergo spontaneous abortion during first trimester of pregnancy (20-38) years and have been investigated from 2015/12/1 -2016/3/1 and compared to fifteen healthy individuals. All subjects were carried out to measure anti-H. pylori IgA and anti- H. pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA). There was significant elevation (p≤ 0.05) in concentration of anti- H. pylori IgG Abs (6.30± 0.99) compared to control group (4.48± 0.61) and IgA Abs (5.42 ± 0.90 U /ml) as compared to control group (3.92 ± 0.41 U/ml). The percentage of H. pylori IgG and IgA was 20% and 25

... Show More
Publication Date
Tue Jan 05 2016
Journal Name
Iraqi Journal Of Science
Local Study of blaCTX-M genes detection in Proteus spp. by using PCR technique
...Show More Authors

n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de

... Show More
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of General Medicine
The Value of Longitudinal Strain versus Coronary Angiography in Detection of Coronary Artery Disease
...Show More Authors

Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Detection of resistance genes (gyrA,qepA,drf1,drf17) for E.coli in Iraqi aquatic environment
...Show More Authors

The control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastew

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (63)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
DETECTION OF sHLA-G PROTEINS IN THE SERA OF PATIENTS INFECTED WITH VISCERAL LEISHMANIASIS
...Show More Authors

Visceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was

... Show More
Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref