Preferred Language
Articles
/
RBcKtY4BVTCNdQwCMldL
Plasma d-dimer level correlated with advanced breast carcinoma in female patients
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Nov 01 2015
Journal Name
Research In Social And Administrative Pharmacy
Evaluation of instruments to assess health literacy in Arabic language among Iraqis
...Show More Authors

View Publication
Scopus (54)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
...Show More Authors

The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera

... Show More
View Publication
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
October-2019
Histological assessment of the efficiency of rabbit serum in healing skin wounds
...Show More Authors

Aim: This study aimed to investigate the impact of rabbit serum on skin wound healing with the help of histological examination. Materials and Methods: A total of ten indigenous rabbits were used in this study. The animals were divided into two groups: control and serum- treated. The histological assessment was done with a paraffin embedding technique and the histological sections were stained with H&E stain. Results: Severe infiltration of polymorphonuclear leukocytes with severe fibrin deposits were seen in serum treated group at 2 days post-injury; at 7 days post-injury the changes revealed moderate fibroplasia, fibrin deposit and severe infiltration of both mononuclear and polymorphonuclear leukocytes; at 14 days post-inju

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
An Investigation to the Abrasive Wear in Pipes Used for Oil Industry
...Show More Authors

The work reported in this study focusing on the abrasive wear behavior for three types of pipes used in oil industries (Carbone steel, Alloy steel and Stainless steel) using a wear apparatus for dry and wet tests, manufactured according to ASTM G65. Silica sand with
hardness (1000-1100) HV was used as abrasive material. The abrasive wear of these pipes has been measured experimentally by measuring the wear rate for each case under different sliding speeds, applied loads, and sand conditions (dry or wet). All tests have been conducted using sand of particle size (200-425) µm, ambient temperature of 34.5 °C and humidity 22% (Lab conditions).
The results show that the material loss due to abrasive wear increased monotonically with

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Products of composers national anthems pioneers in Iraq: زينب صبحي عبد البياتي
...Show More Authors

Highlights This research highlights the important topic of musical topics that rarely talk about a musician, an issue of national songs which sang since the founding of the Iraqi state and until the end of the monarchy in Iraq, and wrote about just newspaper articles explaining the political situation experienced by the era of the history of Iraq and passing quickly marginally on the songs and patrons, so you see the researcher need to search for what was published around any way to see the texts of songs and melodies and rhythms and thus the possibility of evaluation, linked with the course of social and political life spiraling events at the time, so as not to miss these musical and literary, artistic and cultural features of forever a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Dramatic Construction in Quranic Text Surah Taha – A model: جبار خماط حسن
...Show More Authors

There are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 23 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
New Record of the Species Amegilla niveocincta (Smith, 1854)(Hymenoptera:Apidae) in Iraq
...Show More Authors

Publication Date
Sat Jun 01 2024
Journal Name
Muthanna Journal Of Agricultural Science
New Record of the Species Phytomyza isais Hering, 1937 (Diptera:Agromyzidae) in Iraq
...Show More Authors