Preferred Language
Articles
/
abaa-300
New Methods and Old Issues: Theoretical and Methodological Approaches to Social Network Sites in the Arab Region
...Show More Authors

This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Arab Islamic environment raises so many issues and problems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Brazilian Dental Journal
In Vitro Homeostasis of Rat Oral Epithelial Cell Cultures Following Withdrawal of Periodontal Pathogens
...Show More Authors

Abstract Inflammation of periodontal tissues is the consequence of interaction between periodontal pathogens and immune system. This is associated with increased expression of inflammatory cytokines, which may exert destructive effect to the periodontal tissues when released over long period. The aim of this study was to chronologically track the homeostasis of oral keratinocytes following removal of periodontal pathogens. This was done by investigating expression of selected inflammatory markers and integrity of epithelial monolayers in vitro. Rat oral keratinocytes were stimulated with heat-killed Fusobacterium nucleatum and Porphyromonas gingivalis over 7-days then bacteria were washed away and epithelial cells re-cultured for 3-

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Biochemical Study on Anti Thyroid Peroxidase in Type 2 Diabetic patients with thyroid disorders
...Show More Authors

Type 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Detection of Type 2 Diabetes Mellitus in Serum from Women with Polycystic Ovarian Syndrome
...Show More Authors

Polycystic ovary syndrome (PCOS) is one of the most common endocrine disorder. To determine the metabolic disorders in women with PCOS, (25) women with PCOS ages (15 - 47) years have been investigated and compared with (20) healthy individuals. All the studied groups were carried out to measure fasting blood sugar, (anti-GAD Ab, anti ?-islet cell Ab by IFAT) and measured insulin level by ELISA. There was significant elevation in the concentration of fasting blood sugar than in control groups (p ? 0.05) and there was negative results for anti-GAD Ab and anti ?-islet cell Ab by IFAT test for serum of women with PCOS, while there was significant differences in the insulin level for women with PCOS compared with control groups (p ? 0.05), these

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Identifying Average Reservoir Pressure in Multilayered Oil Wells Using Selective Inflow Performance (SIP) Method
...Show More Authors

The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently.  Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Baghdad Science Journal
Determination of chlorpheniramine maleate in its pharmaceutical preparations using homemade turbidity flow injection analyzer
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Aug 10 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. S Ci.
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

The aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.

Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Electrocardiographic changes among beta-thalassemic major patients in ibn al-baladi thalassemia center-Baghdad
...Show More Authors

Background :Thalassemia is an autosomal
disease of the haemoglobin. Two types of
thalassemia are recognized: thalassemia major
and thalassemia intermedia.
The most serious cardiac complication in
thalassemia major is due to multiple blood
transfusions rather than the disease itself, which
is due to iron overload.
Cardiomyopathy is the most common cardiac
defect that occurs with iron overload. Pricarditis,
congestive heart failure and arrhythmias are due
to hemosidrosis and chronic aneamia.
Aim of the study: to demonstrate the prevalence
and types of electrocardiographic changes among
thalassemic patients with aged over ten years old.

View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref