Preferred Language
Articles
/
XhZUE4cBVTCNdQwCHjQk
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Preparation of Vaccine against Diabetic Foot Pathogenic Bacteria Using Low Level Diode Laser
...Show More Authors

Background: Since the invention of laser in 1960, lasers have been developed and approved in many fields. Lasers can now be regarded as practical tools with unique properties that have been utilized effectively in several applications in fields of medical and biological sciences.Objectives: The aim of the current study was to preparation of vaccines (live attenuated and killed) by irradiation of the bacteria by the low level diode laser.Methods: six bacterial isolates were isolated from human samples of diabetic foot infections, which used for preparation of vaccines. The experiment was conducted on fifteen adult male rabbits; they were divided into three groups with 5 rabbits each. Blood samples were collected from the marginal ear vein

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Baghdad University College Of Education Ibn Al-haitham
Numerical Solution of Linear System of Fredholm Integral Equations Using Haar Wavelet Method
...Show More Authors

The aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.

View Publication
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Computer Applications
Improving of Photovoltaic Cell Performance by Cooling using Two different Types of Fins
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Feb 05 2011
Journal Name
International Journal Of Chemical Reactor Engineering
Mass Transport Properties of a Flow-Through Electrolytic Reactor Using Zinc Reduction System
...Show More Authors

An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate

... Show More
View Publication
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Journal The College Of Basic Education / Al-mustansiriyah University
Numerical Solution of Non-linear Delay Differential Equations Using Semi Analytic Iterative Method
...Show More Authors

We present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.

View Publication
Crossref (1)
Crossref
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Vapor Phase Oxidation of Benzoic Acid to Phenol using Nickel-Iron Oxides Catalysts
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
International Journal Of Heat And Technology
Optimization of a rectangular pin fin using rectangular perforations with different inclination angles
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref