Preferred Language
Articles
/
NhbwuIoBVTCNdQwCBaSR
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Correlation the Cytomegalovirus (CMV) IgM Antibodies and Viral DNA Presence with Rheumatoid Arthritis (RA) in Iraqi Patients
...Show More Authors

     In the Iraqi population, a high incidence (82.7%) of rheumatoid arthritis (RA) has been reported among the suspected patient. Many investigators studied the microbial infectious present in Iraqi patients with RA; however, to the best of our knowledge, there is no previous study detected the CMV DNA and antibodies to RA disease. Hence, the current study aimed to investigate the presence of CMV DNA and antibodies in Iraqi RA patients. A total of 58 blood samples were collected from patients with clinical signs of rheumatoid arthritis, along with 32 samples of apparently healthy individuals as a control group. These samples were tested for rheumatoid factor (RF), CMV IgM antibodies and viral DNA during the acute and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Fast encoding algorithm based on Weber's law and Triangular Inequality Theorem
...Show More Authors

In the present work, an image compression method have been modified by combining The Absolute Moment Block Truncation Coding algorithm (AMBTC) with a VQ-based image coding. At the beginning, the AMBTC algorithm based on Weber's law condition have been used to distinguish low and high detail blocks in the original image. The coder will transmit only mean of low detailed block (i.e. uniform blocks like background) on the channel instate of transmit the two reconstruction mean values and bit map for this block. While the high detail block is coded by the proposed fast encoding algorithm for vector quantized method based on the Triangular Inequality Theorem (TIE), then the coder will transmit the two reconstruction mean values (i.e. H&L)

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Surface enhanced Raman spectroscopy based sensitive and specific detection of vitamin D3, glycated hemoglobin, and serum lipid profile of breast cancer patients
...Show More Authors

Considering the expanding frequency of breast cancer and high incidence of vitamin D3 [25(OH)D3] insufficiently, this investigate pointed to explain a relation between serum [25(OH)D3] (the sunshine vitamin) level and breast cancer hazard. The current study aimed to see how serum levels of each [25(OH)D3], HbA1c%, total cholesterol (TC), high density lipoprotein cholesterol (HDL-C), low density lipoprotein cholesterol (LDL-C), and triglyceride (TG) were affected a woman’s risk of getting breast cancer. In 40 healthy volunteers and 69 untreated breast cancer patients with clinical and histological evidence which include outpatients and hospitalized admissions patients at the Oncology Center, Medical City / Baghdad - Iraq. Venous blood samp

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Visceral Leishmaniasis (Anew Approach in diagnosis)
...Show More Authors

This Study· is to investigate the Visceral LeishmaniEJ,sis among 8

susp<:;cted   infants and  young chUdren admitted  1o  AI-Khadhtmiya

Pediatric  Hospital   in Baghdad  between  January  1,2005 o August

31,2005  .For  each  patieni,   a  medical   history  was  obtained  and   a complete physical  examination  was  performed   by physicians  . The serums  of  the .suspected  c_es  were primarily diagnosed by using a new ,simple diagnostic method  bas.ed  on detecting antib9dies  against the  recombinant  K 39  

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Low grade Gliomas Multi Modality Approach
...Show More Authors

Background: Gliomas are brain tumours of supporting tissue of the brain. The management of low grade glioma is still a great debate ranges from just follow up to extensive surgery followed by DXT, with or without chemothery.
Patients and Methods: 282 patients taken from neuro-surgical hospital between 1980-1990, divided to 3 groups with different modality of management & follow up for 15 years.
Results: the five years survival and symptomatic improvement was higher in the group managed by extensive surgery and DXT with or without cytoxic drugs followed by group managed by biopsy and DXT with or without cytoxic.
Conclusion: management of low grade glioma symptoms & out come (survival) is best by extensive surgery & DX

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
New Results of Normed Approach Space
...Show More Authors

     In this work, we introduce  a new convergence formula. We also define cluster point , δ-Cauchy sequence, δ-convergent, δ-completeness , and define sequentially contraction  in approach space. In addition, we prove the contraction condition is necessary and sufficient to get the  function is sequentially contraction  as well as we put a new structure for the norm in the approach space which is called approach –Banach space, we discuss the normed approach space with uniform condition is a Hausdorff space. Also, we prove a normed approach space is complete if and only if the metric generated from approach space is complete as well as prove every finite –dimensional approach normed space is δ-complete. We prove several r

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref