Preferred Language
Articles
/
TBbrD4sBVTCNdQwCH8ed
Molecular Detection of High-Risk Human Papillomavirus Genotypes from Cervical Lesions in Baghdad
...Show More Authors

Objective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 patients with squamous intraepithelial lesions of high grade (H-SIL) and cancer, 55.73% presented genotypes 16 and/or 18, while in 38 patients with presence of altered squamous cells of significance uncertain (ASCUS) and 126 with squamous lesions low-grade intraepithelial (L-SIL), were put on manifest these genotypes only in 7.9% and 22.2%, respectively (p< 0.05). About 12.13% of the 272 patients had a VL< 3 pg/ml. In those with an HPV VL> 3 pg/ml, were HPV-AR found in 77.40% of these (p< 0.05). Conclusions In patients with H-SIL biopsy revealed genotypes 16 and/or 18. The CH2 technique is useful as a screening procedure, while PCR is interesting to identify HPV-HR genotypes

Scopus Crossref
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use sensitivity analysis in evaluating projects Investment under the conditions of risk and uncertainty Case study of glass bottles project in Anbar province
...Show More Authors

This paper studies the investment project evaluation under the condition of uncertainty. Evaluation of investment project under risk and uncertainty is possible to be carried out through application of various methods and techniques. The best known methods are : Risk-adjusted discount rate , certainty equivalent method , Sensitivity analysis and Simulation method The objective of this study is using the sensitivity analysis in evaluation Glass Bottles project  in Anbar province under the condition of risk and uncertainty.

After applying sensitivity analysis we found that the glass bottles project  sensitive to the following factors (cash flow, the cost of investment, and the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Relationships between the Physical and Chemical Properties of Narrow Fractions Distilled From Mixed Kirkuk and Sharki-Baghdad Crude Oils
...Show More Authors

Mixed Kirkuk and Sharki-Baghdad crude oils were distilled into narrow fractions. The range of these narrow fractions were 10oC, starting from IBP to 350oC. The total distillates from mixed Kirkuk and Sharki-Baghdad crude oils were 58.25 vol % and 44.65 vol %, respectively.The hydrocarbons compositions (paraffin, naphthene, aromatic) in light fractions starting from IBP to 250oC were determined by using PONA analysis method. The results show that the paraffin content decreases with increasing mid percent boiling point of the fraction, while the naphthene, and aromatic increase with the increase of mid percent boiling point of mixed Kirkuk and Sharki-Baghdad crude oils. Three groups of empirical equations were developed for the prediction

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Requirements high commitment management to achieve entrepreneurship strategic in busness organization / Field research in Iraqi construction companies
...Show More Authors

This research came to shed light on the relationship between the requirements of (practices) high commitment management (participative decision making،information sharing، training and development،team working،rewards،selective staffing،job security ) and strategic entrepreneurship dimensions (entrepreneurial culture،entrepreneurial leadership،entrepreneurial mindset، strategic management resources ) Sought to achieve the number of goals the knowledge and applied, and tested the relationship and impact between variables in a sample size of 100 directors of personnel departments and divisions and their associates in the Iraqi contractors in Baghdad (Hamorabi، Mutassim، AL Rasheed، AL Mansour  )، focused research

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Regeneration of Pain, Touch, Cold, and Warmth, sensations in split thickness human skin grafts in adults (A clinical study)
...Show More Authors

Back ground: Skin grafting is the most common form
of reconstructive surgery, and regeneration of
sensations in skin grafts is a complex process
influenced by many factors such as , the thickness of
the graft, the depth of the grafted bed, meshing of the
graft, the condition of the bed and the surrounding
area. So many studies performed on this subject, some
of them clinically based on subjective type of sensation
tests, and others histological to detect the presence of
nerve fibers in the grafted skin
Objectives: To detect return of sensations to split
thickness skin grafts by clinical methods.
Methods: From Oct. 1995 to Oct. 2010, a clinical
prospective study performed in Al wasity Hospital for

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
High performance work systems and general industrial enterprise performance
...Show More Authors

High performance work systems and general industrial enterprise performance

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding
...Show More Authors

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref