Preferred Language
Articles
/
QRcGtY4BVTCNdQwCX1fD
Ligasure versus clamp and tie technique to achieve henostasis in thyroidectomy for benign diseases
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Revista Brasileira De Enfermagem
Healthy lifestyle behaviors and risk of cardiovascular diseases among nursing faculty during COVID-19 Pandemic
...Show More Authors

ABSTRACT Objective: Cardiovascular diseases are the first ranked cause of death worldwide. Adhering to health promoting lifestyle behaviors will maintain an individual’s cardiovascular health and decrease the risk of cardiovascular diseases. Methods: In this descriptive study, 150 nursing faculty were surveyed via a non-probability (purposive) sampling method to assess their adherence to health promoting lifestyle in order to know the risk of cardiovascular diseases. The Arabic version of Health-Promoting Lifestyle Profile II (HPLP-II) was used to achieve this goal. Results: Seventy-two nursing faculty completed the survey. The results indicated that the study sample had moderate level of health promotion based on Health-Promot

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical & Cellular Archives
Assessment of uric acid in patients of end-stage renal disease with hypertension and diabetic nephropathy and the risk of cardiovascular diseases
...Show More Authors

The relationship of hyperuricemia to kidney disease, diabetes, hypertension and the risk of cardiovascular diseases remain controversial. The aim of this study is to evaluate the use of uric acid (UA) levels to find the higher risk of cardiovascular disease (CVD) in patients with end stage renal disease that have diabetic nephropathy (DN), nephropathy with hypertension (NH) and patients with both diabetic nephropathy with hypertension (DNH). This study deals with 115 patients with end-stage renal disease under hemodialysis sub-grouped into 35 patients with (DN), 40 patients with (NH), and 40 patients with (DNH). Some biochemical parameters were determined in the serum of all participants such as HbA1c, fasting blood glucose (FBG), UA, urea,

... Show More
Scopus (1)
Scopus
Publication Date
Wed Jun 12 2019
Journal Name
Dirasat: Human And Social Sciences
Teaching by pause technique in the classroom
...Show More Authors

Communication represents the essence of language learning. Since the unspecified evolution of conveying information, human beings have been employing the main constituents of language with short pauses. Although the punctuation marks necessitate short expressions among thought group of words in writing, human language demand for understanding how and when to pause orally. This paper presents the pause technique in the classroom. It signifies the relation between pausing and lecturing in the class and determines its sufficient time-management to interact with college learners of different specializations. The conduct study reviewed teaching pause technique in the empirical studies at Special Education and Communication Disorders of Pennsylva

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Apr 15 2020
Journal Name
Al-mustansiriyah Journal Of Science
Adaptation Proposed Methods for Handling Imbalanced Datasets based on Over-Sampling Technique
...Show More Authors

Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE),  Border

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 11 2003
Journal Name
Iraqi Journal Of Laser
The Use of Pulse Frequency Modulation Technique for Optical Video Communication System
...Show More Authors

An optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Investigation of Mass Transfer for Copper Reduction by Weight Difference Technique
...Show More Authors

An experimental analysis was included to study and investigate the mass transport behavior of cupric ions reduction as the main reaction in the presence of 0.5M H2SO4 by weight difference technique (WDT). The experiments were carried out by electrochemical cell with a rotating cylinder electrode as cathode. The impacts of different operating conditions on mass transfer coefficient were analyzed such as rotation speeds 100-500 rpm, electrolyte temperatures 30-60 , and cupric ions concentration 250-750 ppm. The order of copper reduction reaction was investigated and it shows a first order reaction behavior. The mass transfer coefficient for the described system was correlated with the aid of dimensionless groups as fo

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Lorenz model and chaos masking /addition technique
...Show More Authors

View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref