Preferred Language
Articles
/
bijps-931
Assessment of Causality, Severity and Seriousness of Adverse Event Following Immunization in Iraq: A Retrospective Study Based on Iraqi
...Show More Authors

Immunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of public trust to the vaccination programs.

Vaccine safety monitoring is needed as they now are administered to the general population and also available to special categories such as pregnant women and patients with different diseases whom not subjected to clinical trials as well as incorrect administration rout and presence of rare or delayed onset adverse events make the presence of surveillance system necessary. The aim of the current study was to measure the distribution, percentage, and frequency of adverse reactions related to vaccines administration in Iraq and to assess the causality, severity, seriousness of these adverse reactions. This study is a retrospective descriptive study for surveillance of vaccine safety conducted using Iraqi pharmacovigilance  center database from 2014 till the end of 2018 . 2116 Adverse events were included and outcomes , severity , seriousness , and causality of adverse events were assessed. Majority of adverse events following immunization cases (90.97%) were mild, non serious (94.47%) and recovered (94.23%). Most reports were for general disorders and administration site conditions and the majority were for elevated body temperature and injection site reactions .

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Calcium Carbonate Coating on Osseointegration of Commercially Pure Titanium Implant by Torque Removal Test and Histomorphometric Analysis
...Show More Authors

Abstract Background: One of the most important methods to replace lost teeth is dental implants. In order to increase the strength of connection of the implant with the jaw bone to provide early loading after placement, implant is coated by different coating materials that achieved that purpose. The aim of this study was to evaluate the influence of coating CP Ti implant with calcium carbonate on the strength of bone-implant interface after two and six weeks of implantation in rabbit femur bone by torque removal test, histological and histomorphometric analysis. Materials and methods: Coating the surface of commercially pure titanium screws with extra pure synthetic calcium carbonate via electrophoretic deposition method (EPD) was done. The

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Tigris And Euphrates Rivers: Their Environment From Headwaters To Mouth
Algal Studies in Iraqi Inland Waters. A Review
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-adab Journal
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta

... Show More
Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Study the Dynamic Behavior of Rotor Supported on a Worn Journal Bearings
...Show More Authors

In this paper, the effect of wear in the fluid film journal bearings on the dynamic behavior of rotor bearing system has been studied depending on the analytical driven of dynamic stiffness and damping coefficients of worn journal bearing. The finite element method was used to modeling rotor bearing system. The unbalance response, critical speed and natural frequency of rotor bearing system have been studied to determine the changes in these parameters due to wear. MATLAB software was used to find the analytical values of dynamic coefficients of journal bearing. The results of rotor mounted on fluid film journal bearings showed that the wear in journal bearing increases the amplitude of unbalance response and decrease critical speed, sta

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Exploring the Impact of Petrophysical Uncertainties on Recoverable Reserves: A Case Study
...Show More Authors

Reliable estimation of critical parameters such as hydrocarbon pore volume, water saturation, and recovery factor are essential for accurate reserve assessment. The inherent uncertainties associated with these parameters encompass a reasonable range of estimated recoverable volumes for single accumulations or projects. Incorporating this uncertainty range allows for a comprehensive understanding of potential outcomes and associated risks. In this study, we focus on the oil field located in the northern part of Iraq and employ a Monte Carlo based petrophysical uncertainty modeling approach. This method systematically considers various sources of error and utilizes effective interpretation techniques. Leveraging the current state of a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref