Preferred Language
Articles
/
aRcFW44BVTCNdQwCC0RE
The effect between combination of cold plasma and gold nano material on blood components
...Show More Authors

A simple low-cost approach at various exposure times was utilized to generate cold plasma in the aim to fabricate AuNPs. UV-Visible spectra and X-ray diffraction were used to characterize the nanoparticles (XRD). Surface Plasmon resonance was observed in the synthesized AuNPs at 530, 540, and 533 nm. For all samples, the patterns of XRD show very intensive peaks implying the fcc crystalline structure of AuNPs. The average crystallite size of AuNPs is ranging between 20-30 nm. The observation of morphology by FESEM revealed the spherical formation of AuNPs. Doses of 100 and 200 ppm of AuNPs were adapted to investigate their effect on the blood-mixture with and without a 20-second of cold plasma exposure. The WBC components in the blood rose as the AuNPs doses increased, whereas, the amount of (pt) in the blood fell down throughout the two weeks of AuNPs doses for the groups which exposed to AuNPs only, the level of (pt) in the blood increased in the groups which are exposed to AuNPs combined with cold plasma. While the RBC unaffected.

Scopus Crossref
View Publication
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On Tˉ-pure sub-acts over moniods
...Show More Authors

The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Apr 25 2014
Journal Name
Journal Of Kufa For Nursing Science
Environmental Effects On Women's With Spontaneous Abortion
...Show More Authors

Background: spontaneous abortion constitutes one of the most important adverse pregnancy outcomes affecting human reproduction, and its risk factors are not only affected by biological, demographic factors such as age, gravidity, and previous history of miscarriage,but also by individual women’s personal social characteristics, and by the larger social environment. Objective:To identifyEnvironmental effects on Women's with Spontaneous Abortion. Methodology:Non-probability(purposive sample)of(200) women, who were suffering from spontaneous abortion in maternity unitfrom four hospitals at Baghdad City which include Al-ElwiaMaternity Teaching Hospital, and Baghdad Teaching Hospital at Al-Russafa sector. Al–karckhMaternityHospita

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Tue Feb 10 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electro-less Copper Deposition on ABS Plastic
...Show More Authors

CuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.

View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economic And Administrative Science
On Shrinkage Estimation for Generalized Exponential Distribution
...Show More Authors

Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Fast Processing RNA-Seq on Multicore Processor
...Show More Authors

RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref