Preferred Language
Articles
/
SBi7S5QBVTCNdQwCWATi
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed May 17 2017
Journal Name
Helminthologia
Baylisascaris procyonis roundworm infection patterns in raccoons (Procyon lotor) from Missouri and Arkansas, USA
...Show More Authors
Summary<p> Baylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled </p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The role of MIS in the negotiation process "An Analytical Study in a Sample of Iraqi Organizations"
...Show More Authors

Negotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.

Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.

To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.

 A Number of conclusions were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Characters anatomy of CorchorusolitoriusL. from Malvaceae family cultivated in Iraq
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Survey of some Fish Species from Different Localities in Baghdad
...Show More Authors
Abstract<p>This study is concerned with a survey of seven species belonging to seven genera under two families and two orders found in some different areas of the Tigris River, especially since these areas have not been surveyed for a long time, and an attempt to identify the existing species at the present time after the recent water scarcity of the Tigris and Euphrates rivers and all water bodies interior of Iraq and the impact of this scarcity on the fish diversity found in some areas of the Tigris River in Baghdad.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Recovery of Catalyst from Tar Formed in Phenol Production Unit
...Show More Authors

This work was conducted to study the recovery of catalyst and desirable components from tar formed in phenol production unit and more particularly relates to such a method whereby better recovery of copper salts, phenol, benzoic acid and benzoate salts from tar by aqueous acid solution was accomplished.
The effect of solvent type, solvent concentration (5, 10, 15, 20, 25 and 30 wt%), agitation speed (100, 200, 300 and 400 rpm), agitation time (5, 10, 15, 20 and 25 min), temperature (90, 100, 110, 120, 130 and 140 oC) , phase ratio (1/1, 2/1, 3/1, 4/1 and 5/1) and number of extraction (1, 2, 3, 4, and 5) were examined in order to increase the catalyst and desirable components extraction.
Four types of solvent were used; hydrochloric

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
A comparative study of the role of monetary policies in achieving economic growth in some oil and non-oil countries during the period 1990-2017
...Show More Authors

The research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.

The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 23 2020
Journal Name
Biomed Research International
A Computational Model of the Brain Cortex and Its Synchronization
...Show More Authors

Obtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea

... Show More
View Publication
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF Biosensing technique for detection of H.pylori bacteria: Israa M.L. SaQari*, Layla M.H. Al-ameri
...Show More Authors

Abstract :H.pylori is an important cause of gastric duodenal disease, including gastric ulcers, Mucosa-associated lymphoid tissue (MALT), and gastric carcinoma. biosensors are becoming the most extensively studied discipline because the easy, rapid, low-cost, highly sensitive, and highly selective biosensors contribute to advances in next-generation medicines such as individualized medicine and ultrasensitive point-of-care detection of markers for diseases.  Five of ten patients diagnosed with H.pylori ranging in age from 15–85 participated in this research. who [gastritis, duodenitis, duodenal ulcer (DU), and peptic ulcer (PU)] Suspected H.pylori colonies w

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref