Preferred Language
Articles
/
alkej-566
Analysis of Wave Propagation in Detection of Aorta Dieses Using Lumps Analysis
...Show More Authors

In this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement.  The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Monetary Policy Management of the Money Supply to Interest rates in Iraqi Economy for the period 2004-2011
...Show More Authors

The results show the inability to apply the Taylor rule within inflation and GDP Gaps because the monetary behave is elated from the Iraqi economy.

When applying the Taylor rule to exchange rate with the inflation and the output gap, the results do not match the nominal price announced by the central thing, which proves the lack of commitment by the Central Bank by using the Taylor rule, whether short-run interest rate or exchange rate (Nominal Anchor),  so it did not stay to the Iraqi Central Bank only using the principle of Taylor with the expected inflation rate below the level of output (Macro activity) for the separation of monetary behavior from the real one o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Photogrammetric analysis of facial soft tissue profile of Iraqi adults sample with Class II div.1 and Class III malocclusion: (A comparative study)
...Show More Authors

Background: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class II div.1 and class III malocclusion using standardized photographic techniques and to verify the existence of possible gender differences. Materials & methods: Seventy five Iraqi adult subjects, 50 class II div.1 malocclusion (24 males and 26 females), 25 class III malocclusion (14 males and 11 females), with an age range from 18-25 years. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position. The photographs were analyzed using AutoCAD program 2007 to measure the distances and angles used in t

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Taboo Words Vs. Social Deixis: A sociolinguistic Analysis of La Justice or The Cock that Crew: A Play from the Theatre of Ridiculous
...Show More Authors

Linguistic taboos exist in most cultures. Tabooed words are generally being culturespecific
and relating to bodily functions or aspects of a culture that are sacred. Such words are
avoided, considered inappropriate and loaded with affective meaning and failing to adhere to.
Strict rules, often, governing their use and lead to punishment or public shame. These taboo
words can be used as a way of violating social deixis represented by four types of honorifics;
addressee, referent, bystander, and finally setting honorifics. This paper shows how these
taboo words are used in Kenneth Bernard's play La Justice or The Cock that Crew from the
theatre of the Ridiculous as means of violating social deixis in its four types. Th

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 04 2022
Journal Name
Pakistan Journal Of Medical And Health Science
Detection of aadA1 and aac(3)-1V resistance genes in Acinetobacter baumannii
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Detection of HBME-1 and galectin-3 by immunohistochemistry in follicular lesions
...Show More Authors

The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between

... Show More
Scopus
Publication Date
Mon May 09 2022
Journal Name
مجلة كلية التربية الاساسية الجامعة المستنصرية
Detection of sul1 resistance gene in Acinetobacter baumannii from different Clinical cases
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
مجلة الأطروحة العلمية المحكمة-العلوم الصرفة والتطبيقية
Detection of Lead (Pb) and Cadmium (Cd) Concentrations in Some Indomie Samples
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Tropical Journal Of Natural Product Research
Detection of Herpes Simplex Virus Type 1 in Patients Affected by Conjunctivitis
...Show More Authors

Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Dec 28 2020
Journal Name
The Iraqi Journal Of Veterinary Medicine
Serological and Molecular Phylogenetic Detection of Coxiella burnetii in Lactating Cows, Iraq
...Show More Authors

This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref