Preferred Language
Articles
/
bsj-625
Developing of bacterial mutagenic assay system for detection
...Show More Authors

Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Materials Science And Engineering
Effect of nanoparticles on thermal conductivity of epoxy resin system
...Show More Authors
Abstract<p>In this paper the effect of mixing TiO2 nanoparticles with epoxy resin is studied. The TiO2 nanoparticles would be synthesis and characterized by scanning electron microscopy (SEM), XRD FTIR, for two particle sizes of 50 and 25 nm. The thermal conductivity is measured with and without composite epoxy resin; the results showed that the thermal conductivity was increased as nanoparticle concentration increased too. The thermal conductivity was increased as particle size decreased.</p>
Preview PDF
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Journal Of Optical Communications
Analyzing of UVLC system considering the effect of water depth
...Show More Authors
Abstract<p>This paper presents a new approach to discover the effect of depth water for underwater visible light communications (UVLC). The quality of the optical link was investigated with varying water depth under coastal water types. The performance of the UVLC with multiple input–multiple output (MIMO) techniques was examined in terms of bit error rate (BER) and data rate. The theoretical result explains that there is a good performance for UVLC system under coastal water.</p>
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Nelson-Olson Method and Two-Stage Limited Dependent Variables (2SLDV ) Method for the Estimation of a Simultaneous Equations System (Tobit Model)
...Show More Authors

This study relates to  the estimation of  a simultaneous equations system for the Tobit model where the dependent variables  ( )  are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods  different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method  and  Two- Stage limited dependent variables(2SLDV) method  to get of estimators that hold characteristics the good estimator .

That is , parameters will be estim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of business incubators represented by the banking system in financing small and medium enterprises in Iraq for the period 2000-2010
...Show More Authors

The process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.

What encouraged countries to pay attention to these institutions is the ease of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 07 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400: DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400
...Show More Authors

A microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Spe
SPE-188966-MS: Drilling problems detection in Basrah oil fields using smartphones
...Show More Authors

Scopus (1)
Scopus