Preferred Language
Articles
/
bsj-3315
A Assessment of long distance chasing photometer (NAG-ADF-300-2) by estimating the drug atenolol with ammonium molybdate via continuous flow injection analysis: drug atenolol a

     Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of atenolol at concentration (0.5, 0.7 and 5) mmol/L respectively. The results were compared with classical method UV-Spectrophotometric at λ max=270 nm using the standard addition method via the use of t-test, at 95% confidence level. The comparison of data explain that long distance chasing photometer (NAG-ADF-300-2) is the choice with excellent extended detection and wide application.                                                                                                       

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique

    The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th

... Show More
Scopus (8)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Gingival Enlargement Management using Diode Laser 940 nm and Conventional Scalpel Technique (A Comparative Study)

Diode lasers are becoming popular in periodontal surgery due to their highly absorption by pigments such as melanin and hemoglobin their weak absorption by water and hydroxyapatite makes them safe to be used around dental hard tissues. Objective: The aim of the present study was to evaluate the efficiency of diode laser in performing gingivectomy in comparison to conventional scalpel technique in patients with chronic inflammatory enlargement. Materials and methods: Thirty patients were selected for this study. All of them required surgical treatment of gingival enlargements and were randomly divided into two groups: Control group (treated by scalpel and include sixteen patients) and study group (treated with diode laser 940nm and includ

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 13 2020
Journal Name
2020 Ieee International Conference On Mechatronics And Automation (icma)
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
Scopus (9)
Crossref (5)
Scopus Crossref
View Publication
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Colostomy closure in pediatric age group A comparative study between Single and double layer anestomosis

This prospective study involved one hundred patients with colostomies admitted at the Central Pediatric Teaching Hospital for colostomy closure over the period of two years (Jan.2000-
Jan2002).
Patients were divided in to two groups according to the technique of colostomy closure. In the first group, the closure was done by single layer of interrupted non-absorbable suture material; in the  second group closure was done by double layer suturing technique. All patients were prepared by the same conventional method including fluid diet for three days
followed by two days washing enemas before operation with antimicrobial prophylaxis agents. Of these one hundred patients;(48) presented as cases of Hirschspr

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 30 2020
Journal Name
Telecommunication Systems
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
A Comparative Study Using DCT, Delta Modulation, and Double Shift Coding for Compressing Electroencephalogram Data

      Storing, transferring, and processing high-dimensional electroencephalogram (EGG) signals is a critical challenge. The goal of EEG compression is to remove redundant data in EEG signals. Medical signals like EEG must be of high quality for medical diagnosis. This paper uses a compression system with near-zero Mean Squared Error (MSE) based on Discrete Cosine Transform (DCT) and double shift coding for fast and efficient EEG data compression. This paper investigates and compares the use or non-use of delta modulation, which is applied to the transformed and quantized input signal. Double shift coding is applied after mapping the output to positive as a final step. The system performance is tested using EEG data files from the C

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
A Genetic Algorithm for Minimum Set Covering Problem in Reliable and Efficient Wireless Sensor Networks

Densely deployment of sensors is generally employed in wireless sensor networks (WSNs) to ensure energy-efficient covering of a target area. Many sensors scheduling techniques have been recently proposed for designing such energy-efficient WSNs. Sensors scheduling has been modeled, in the literature, as a generalization of minimum set covering problem (MSCP) problem. MSCP is a well-known NP-hard optimization problem used to model a large range of problems arising from scheduling, manufacturing, service planning, information retrieval, etc. In this paper, the MSCP is modeled to design an energy-efficient wireless sensor networks (WSNs) that can reliably cover a target area. Unlike other attempts in the literature, which consider only a si

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Comparative Study between Dusting and Fragmentation in Intracorporeal Laser Lithotripsy in Distal Ureteric Stone

Background: Ureteric stones commonly have an impact on the quality of life of the patient. There are many treatment choices for the condition, including medical treatment, extra-corporeal shock wave lithotripsy (ESWL), endoscopic intervention by ureteroscope (URS), or surgery (open or laparoscopic). Semi-rigid URS with laser lithotripsy is used to fragment ureteric stones, especially those in the distal ureter.

Objectives: To assess the efficacy and complications of the dusting versus the fragmentation method for lower ureteric stones using holmium laser lithotripsy by analyzing intra-operative and post-operative variables.

Patients and methods: One hundred and twenty patie

... Show More
Crossref
View Publication Preview PDF