Preferred Language
Articles
/
bsj-843
Serum Protein Profile Of Iraqi Hydatidosis Patients with Different Sites of Infection
...Show More Authors

Blood samples of One hundred and twenty patients from different hospitals in Baghdad infected with hydatidosis in different sites of the body (Liver, Lung, multiorgans and kidney) were collected for this study. On the other hand, 30 healthy individuals were included as a control group. This study was conducted to evaluate the effect of this disease on the serum protein profile of the patients using electrophoresis. The results revealed four different protein banding patterns with difference in number of bands and their molecular weights in comparison to the control group, and these differences depended on the site of infection. However the data showed a presence of the same band in all patients with different site of infection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Assessing BIM Integration with Sustainable Requirement for Buildings Construction
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 09 2020
Journal Name
Agrosystems, Geosciences & Environment
In-season potato yield prediction with active optical sensors
...Show More Authors

Crop yield prediction is a critical measurement, especially in the time when parts of the world are suffering from farming issues. Yield forecasting gives an alert regarding economic trading, food production monitoring, and global food security. This research was conducted to investigate whether active optical sensors could be utilized for potato (Solanum tuberosum L.) yield prediction at the mid.le of the growing season. Three potato cultivars (Russet Burbank, Superior, and Shepody) were planted and six rates of N (0, 56, 112, 168, 224, and 280 kg ha−1), ammonium sulfate, which was replaced by ammonium nitrate in the 2nd year, were applied on 11 sites in a randomized complete block design, with four replications. Normalized difference ve

... Show More
View Publication
Publication Date
Sat Sep 01 2018
Journal Name
International Journal Of Applied Engineering Research
Tendon Type Robotic Gripper with Frictional Self-Locking Mechanism
...Show More Authors

This research considers a proposed mechanism relying on frictional interactions between the grasped object and the gripper, thus attaining a case of self-locking condition for a tendon type robotic gripper. A mathematical model was derived for this proposed mechanism, upon which a special purpose apparatus was fabricated and tested. Both results, theoretically and experimentally, are in good agreement, showing that the weight of the grasped object played a major role in attaining the self-locking condition.

View Publication Preview PDF
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks & Communications
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reproductive Dysfunction in Women with PCOS: A Review Article
...Show More Authors

Polycystic ovary syndrome (PCOS) is a significant cause of infertility due to ovulation dysfunction in women of childbearing age. Although the pathogenesis of PCOS is still not clear, many studies have shown that many factors within the ovary promote infection. With this syndrome, the disruption of the natural monthly ovulation process causes an imbalance in the body's hormones, and the high level of insulin in the body and the blood sugar imbalance leads to the occurrence of hyperandrogenism, which is the main factor for the occurrence of pathogens, in addition to genetic factors, if any. This study aims to identify this disease and its most important causes, symptoms, and modern treatments to prevent and get rid of it. Polycystic

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref