Preferred Language
Articles
/
bsj-7253
Determination of essential and trace elements in various vegetables using ICP-MS
...Show More Authors

Metal contents in vegetables are interesting because of issues related to food safety and ‎potential health risks. The availability of these metals in the human body ‎may perform many biochemical functions and some of them linked with various diseases at ‎high levels. The current study aimed to evaluate the concentration of various metals in ‎common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables ‎of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common ‎purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for ‎Ba, ‎2812‎-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–‎‎1.53 for Li, 860-14330 for Mg, 16.20-71.5 for Mn, 612-4725 for Na and 15.8-46 µg ‎g-1 for Zn. The results revealed that the concentration of Al, B except in Syrian mesquite, Ba, Ca, ‎Fe, K, Mg and Mn in all analysed vegetables is higher than the recommended value, Li is ‎well-within the safe limit, and Co, Na except in dill, arugula and common purslane, Zn are ‎lower than the recommended intake of these elements. From health point of view, the HQ values for Al, Fe ‎‎(for all vegetables) and Ba (in dill, vine leaves, thymes, arugula, basil, common ‎‎purslane and ‎parsley) were higher than one, indicating potential non-cancer health risk due to exposure to ‎these metals. Furthermore, the HI value for all vegetables was higher than one, indicating ‎potential non-cancer health risk due to long-term exposure to these metals.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Effect of Using Different Levels of Spirulina Algae (Spirulina Platensis) in The Diet on Concentration, Types of Fatty Acids, Oxidation Indicators, and Sensory Characteristics of Broiler Carcasses
...Show More Authors
Abstract<p>This study was conducted at the Poultry Research Station of the Agricultural Research Department/Ministry of Agriculture in Abu Ghraib for the period from 25/2/2019 to 7/4/2019 (42 days) with the aim of using several levels of Spirulina (SP)<italic>Spirulina platensis</italic>in broiler diets. And their effect in the concentration and types of fatty acids, oxidation indices and sensory characteristics of the broiler carcass, 400 birds were used in this experiment One day old broiler birds of the Ross 308 strain are un sexed, with an average starting weight of 40 g/bird, and the birds were randomly distributed into five treatments with four replications per treatment (20 birds/duplicate). Th</p> ... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology &amp; Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DESIGN AND IMPLEMENTATION AN IRAQI CITIES DATABASE USING K-D TREE
...Show More Authors

This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).

View Publication Preview PDF