Preferred Language
Articles
/
alkej-556
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the original signal for the sake of diagnosis.

      These calculations were carried out for different breast thicknesses to find out the best modulation laser beam wavelength and the optimum breast thickness necessary for diagnosis of benign and malignant tumors.

      According to our work the most suitable laser wave length to detect the breast tumor for pre- and postmenopausal females was 956 nm and 674 nm for both malignant and benign tumors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 21 2022
Journal Name
International Journal Of Research In Social Sciences And Humanities
Managing Trading Decisions Using The True Strength Index –An Applied Study
...Show More Authors

The purpose of this research is to test the ability of the true strength index To time and manage trading in the financial market to select the best stocks and achieve a higher return than the Simple buy and hold strategy. And To achieve the objectives of the research, it relied on the main hypothesis, which is By using the True Strength Index to manage trading decisions buying and selling, can be achieved higher returns than the buy and hold strategy . The research community has been identified with all stocks listed on the Iraq Stock Exchange. Implementing the financial research tests requires selecting a sample from the research community that fulfills the test requirements according to a number of conditions So (38) companies we

... Show More
View Publication
Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Multicomponent Biosorption of Heavy Metals Using Fluidized Bed of Algal Biomass
...Show More Authors

This paper aims to study the biosorption for removal of lead, cadmium, copper and arsenic ions using algae as a biosorbent. A series of experiments were carried out to obtain the breakthrough data in a fluidized bed reactor. The minimum fluidization velocities of beds were found to be 2.27 and 3.64 mm/s for mish sizes of 0.4-0.6 and 0.6-1 mm diameters, respectively. An ideal plug flow model has been adopted to characterize the fluidized bed reactor. This model has been solved numerically using MATLAB version 6.5. The results showed a well fitting with the experimental data. Different operating conditions were varied: static bed height, superficial velocity and particle diameter. The breakthrough curves were plotted for each metal. Pb2+ s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Properties of an Iraqi Carbonate Reservoir Using Well Log Evaluation
...Show More Authors

This research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A comparison of the Semiparametric Estimators model smoothing methods different using
...Show More Authors

In this paper, we made comparison among different parametric ,nonparametric and semiparametric estimators for partial linear regression model users parametric represented by ols and nonparametric methods represented by cubic smoothing spline estimator and Nadaraya-Watson estimator, we study three nonparametric regression models and samples sizes  n=40,60,100,variances used σ2=0.5,1,1.5 the results  for the first model show that N.W estimator for partial linear regression model(PLM) is the best followed the cubic smoothing spline estimator for (PLM),and the results of the second and the third model show that the best estimator is C.S.S.followed by N.W estimator for (PLM) ,the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and Periapical Healing of Immature Teeth Using Mineral Trioxide Aggregate
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Direction of Arrival Estimation of Meteors Echoes using Array Radio Antennas
...Show More Authors

Array antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Heterogeneously Catalyzed Esterification Reaction: Experimental and Modeling Using Langmuir- Hinshelwood Approach
...Show More Authors

The esterification reaction of ethyl alcohol and acetic acid catalyzed by the ion exchange resin, Amberlyst 15, was investigated. The experimental study was implemented in an isothermal batch reactor. Catalyst loading, initial molar ratio, mixing time and temperature as being the most effective parameters, were extensively studied and discussed. A maximum final conversion of 75% was obtained at 70°C, acid to ethyl alcohol mole ratio of 1/2 and 10 g catalyst loading. Kinetic of the reaction was correlated with Langmuir-Hanshelwood model (LHM). The total rate constant and the adsorption equilibrium of water as a function of the temperature was calculated. The activation energies were found to be as 113876.9 and -49474.95 KJ per Kmol of ac

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Wed Apr 25 2012
Journal Name
The Nineteenth Scientific Conference The College Of Education \al-mustansiriyah University
Solution of Ordinary BVP's of Eighth Order Using Osculatory Interpolation Technique
...Show More Authors

The aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.

View Publication