Preferred Language
Articles
/
NRZle4sBVTCNdQwCisw0
Association study of two single nucleotide polymorphisms rs10757278 and rs1333049 with atherosclerosis, a case-control study from Iraq
...Show More Authors

Scopus
View Publication
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (59)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Sun Apr 03 2011
Journal Name
Journal Of The Faculty Of Medicine Baghdad
TNF-a and Autoimmunity in chronic rgeumatic heart disease
...Show More Authors

Background: we know that TNF-a which is consider an important inflammatory cytokine mediate the inflammatory reactions which occur in the tissues against the infections agents and other causes of inflammation therefore, here we try to study the role of TNF-a in chronic Rheumatic heart disease and the relationship of TNF-a with extent of histopathological.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Medical Child Abuse and Child Protection
...Show More Authors

Background

Medical child abuse describes a child receiving unnecessary, harmful, or potentially harmful medical care at the caretaker's instigation.

Objectives

To focus on medical child abuse as an entity and emphasize its epidemiology, clinical presentations, prevention, and management.

Results

In the UK, the annual incidence of medical child abuse in children below one year increased to 3:100,000, while its prevalence in Arabs, including Iraq, is ambiguous due to lack of evidence and improper clinician's awareness. The mean age at diagnosis is 14 months to 2.7 years. Female caregivers are the most common offenders. Clinically, medical child abuse

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Mannich Bases: Synthesis, Pharmacological Activity, and Applications: A Review
...Show More Authors

      The Mannich reaction is one of the most important types of organic chemistry fundamental reactions. It is a crucial stage in the production of various medicines, natural goods, and industrial chemicals. Chemists' imaginations have always been piqued because of this. In general, the Mannich reactions can be used as part of a tandem reaction sequence to produce complex target molecules in an elegant and often easy manner. The following article examines and summarizes methods for synthesizing Mannich derivatives, in addition to offering a survey of recent advancements in several fields’ applications of the Mannich reaction, such as biological applications, antimicrobial activity, anticancer activity, anti-inflammation and antio

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon Feb 08 2016
Journal Name
Iraqi Journal Of Science,
Synthesis, Identification and Evaluation Biological Activity for Some New Triazole, Triazoline and Tetrazoline Derivatives From 2-Mercapto-3- phenyl-4(3H)Quinazolinone
...Show More Authors

This research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4- tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2)

... Show More
Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Synthesis, Identification and Evaluation Biological Activity for Some New Triazole, Triazoline and Tetrazoline Derivatives From 2-Mercapto-3-phenyl-4(3H)Quinazolinone
...Show More Authors

This research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4-tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2) re

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Prevalence of Posttraumatic Stress Symptomatology and Distribution of Attachment Patterns 1 and 5 Months after a Terrorist Attack
...Show More Authors

As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the part

... Show More
View Publication Preview PDF