Preferred Language
Articles
/
alkej-99
Bone Defect Animal Model for Hybrid Polymer Matrix Nano Composite as Bone Substitute Biomaterials
...Show More Authors

Addition of bioactive materials such as Titanium oxide (TiO2), and incorporation of bio inert ceramic such as alumina (Al2O3), into polyetheretherketone (PEEK) has been adopted as an effective approach to improve bone-implant interfaces. In this paper, hot pressing technique has been adopted as a production method. This technique gave a homogenous distribution of the additive materials in the proposed composite biomaterial. Different compositions and compounding temperatures have been applied to all samples. Mechanical properties and animal model have been studied in all different production conditions. The results of these new TiO2/Al2O3/PEEK biocomposites with different compositions were promising, mechanical properties within the range of human cortical bone, suitable for load bearing applications. At the same time, in vivo test shows no inflammation reaction with implanted samples. Sustained viability in contact with the sample over seven-day period, showed evidence of excellent biocompatibility in injured rejoins.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
Proposed family speech recognition
...Show More Authors

Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.

Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Age Estimation Using Support Vector Machine
...Show More Authors

Recently there has been an urgent need to identify the ages from their personal pictures and to be used in the field of security of personal and biometric, interaction between human and computer, security of information, law enforcement. However, in spite of advances in age estimation, it stills a difficult problem. This is because the face old age process is determined not only by radical factors, e.g. genetic factors, but also by external factors, e.g. lifestyle, expression, and environment. This paper utilized machine learning technique to intelligent age estimation from facial images using support vector machine (SVM) on FG_NET dataset. The proposed work consists of three phases: the first phase is image preprocessing include four st

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2024
Journal Name
Journal Of Mathematics And Computer Science
The role of human shield in prey‎, ‎crop-raiders and top predator species in southwestern Ethiopia's coffee forests‎: ‎a modeling study
...Show More Authors

In this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe

... Show More
View Publication
Publication Date
Thu Oct 31 2024
Journal Name
Intelligent Automation And Soft Computing
Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm
...Show More Authors

Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Application of Total Quality Management (TQM) Requirements in Risk Management in Construction Projects in Iraq
...Show More Authors

Total quality management  considers one of the modern scientific entrances  which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have  in a manner in which they can be addressed and find ways to avoid them in the future when repeated.                          &n

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Modeling and Stability of Lotka-Volterra Prey-Predator System Involving Infectious Disease in Each Population
...Show More Authors

In this paper, a mathematical model consisting of the prey- predator model with disease in both the population is proposed and analyzed. The existence, uniqueness and boundedness of the solution are discussed. The existences and the stability analysis of all possible equilibrium points are studied. Numerical simulation is carried out to investigate the global dynamical behavior of the system.

View Publication Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
Processing and interpretation of 3D seismic data of an oil field in central of Iraq using AVO techniques
...Show More Authors

In this research, a qualitative seismic processing and interpretation is made up
through using 3D-seismic reflection data of East-Baghdad oil field in the central part
of Iraq. We used the new technique, this technique is used for the direct hydrocarbons
indicators (DHI) called Amplitude Versus Offset or Angle (AVO or AVA) technique.
For this purposes a cube of 3D seismic data (Pre-stack) was chosen in addition to the
available data of wells Z-2 and Z-24. These data were processed and interpreted by
utilizing the programs of the HRS-9* software where we have studied and analyzed
the AVO within Zubair Formation. Many AVO processing operations were carried
out which include AVO processing (Pre-conditioning for gathe

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 27 2020
Journal Name
Iraqi Journal Of Science
Impact of Geological Structures on Rock Slope Stability in The NW Nose (Plunge ) of Surdash Anticline, Sulaimaniya/ NE Iraq
...Show More Authors

The road network in Surdash anticline is considered as an important road network connecting lower Dukan town with the touristic upper Dukan town. Dukan lake plays an important role in the social and economic activities of Dukan town and the surrounding areas.
For assessing the stability of the rock slopes in the area, 9 stations were selected along the upper Dukan road on both sides of Surdash anticline, and their stability was evaluated by the kinematic analysis using DIPS V6.008 software. 
Kinematic analysis of the studied stations shows thatplanar sliding is possible in stations No. 1, 2, 3 and 8, while wedge sliding is possible in station No. 5, 6, 7 and 9b. The other stations (No. 4and 9a) are stable. Tectonic structures

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MULTIVARIATE ANALYSIS OF THE STEM ANATOMICAL CHARACTERS OF TERMINALIA L. (COMBRETACEAE) IN EGYPT
...Show More Authors

A comparative investigation of the anatomical characters through a microscopical examination of the prepared transverse sections of the stem was carried out. Six plates with 32 photomicrographs were provided to convincingly show the considerable variations of anatomical characters within the nine examined species. The matrix of 18 anatomical characters which included nine quantitative and nine qualitative was applied for the clustering analysis (CA) followed by the principal component analysis (PCA) using the Multivariate Analysis of Ecological Data, PC-ORD.
The results exhibited significant variations among the species resulting in the construction of an artificial key; this key accurately represents a sufficient tool to display the

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref