Preferred Language
Articles
/
UhfvV5IBVTCNdQwCC6yB
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A New Iterative Methods For a Family of Asymptotically Severe Mappings
...Show More Authors
Abstract<p>The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
THE STUDY ON ABILITY OF ESCHERICHIA COLI ISOLATED FROM DIFFERENT CLINICAL CASES TO BIOFILM FORMATION AND DETECTION OF CSGD GENE RESPONSIBLE FOR PRODUCE CURLI (FIMBRIAE)
...Show More Authors

A total of 165 clinical sample included Urine, Swab wounds and Burns were collected from Baghdad Governorate. Results showed that rate all isolates of E. coli was 50(30.3%) and rate of urine infection was 46(92%) and rate of swab wounds infection 4(8%). Where was diagnostic based on streaked on MacConkey agar, then single colony was transferred to Eosin Methylene Blue (EMB). Identification some of the biochemical test included: Catalase test, Oxidase test, Indole test, Methyl red, Vogues - Proskauer test and Citrate Utilization test. Then confirmed by the Vitek - 2 Compact System. The ability of E.coli isolate to biofilm formation to be studied it is considered one of the most important factors of virulence and has role in causing injury an

... Show More
Scopus (2)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Science
Using of Remote Sensing Technique to Monitor The Status of The Plant and Change Detection for Three Different Periods in Western Region in Baghdad/ Iraq
...Show More Authors

Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased

... Show More
View Publication
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Pharmaceutical Research
New method for the evaluation of propranolol with phosphotungstic acidvialong distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis
...Show More Authors

A new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 11 2024
Journal Name
Eximia
Using an educational method according to special exercises to perform the skill of bow and develop flexibility for cub wrestlers in Iraq
...Show More Authors

creating unique exercises utilizing a teaching approach that works with the research sample, determining how special exercises affect the development of torso flexibility, and determining how special exercises affect the development of bow ability. Activate the search The results of the pre- and post-tests for the control and experimental research groups show a statistically significant association that is favoring the post-test in the development of bow skill performance Using the experimental technique, the researcher set up one group and gave them two tests (pre and post) based on scientific theories that made sense for the topic at hand. Forty adolescent wrestlers from the Adhamiya Club in the Baghdad Governorate were recognized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF