Preferred Language
Articles
/
ijl-61
Nano Fluid Detection for HPHE System Using Different Lasers
...Show More Authors

Among the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For higher concentration, the agglomeration can occur so the scattering of laser light was increased resulting in the decrement of output power. Laser with longer wavelength (650nm) at visible spectral region was more sensing compared with 532 nm laser for low concentration of Ag inside deionized water. The starting sensing powers of 532nm CW diode laser is 0.1W of these concentrations for this type of nanofluid while the ending detection power is 1W.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Heave Behavior of Granular Pile Anchor-Foundation System (GPA-Foundation System) in Expansive Soil
...Show More Authors

Granular  Pile  Anchor  (GPA)  is  one  of  the  innovative  foundation  techniques,  devised  for mitigating heave of footing resulting from the expansive soils. This research attempts to study the heave behavior of (GPA-Foundation System) in expansive soil. Laboratory tests have been conducted on an experimental model in addition to a series of numerical modeling and analysis using the finite element package PLAXIS software. The effects of different parameters, such as (GPA) length (L) and diameter (D), footing diameter (B), expansive clay layer thickness (H) and presence of non-expansive clay are studied. The results proved the efficiency of (GPA) in reducing the heave of exp

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic audit in detection of financial corruption cases in Iraq - Proposed Framework
...Show More Authors

This research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.

Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 24 2009
Journal Name
Proceeding Of 3d Scientific Conference Of The College Of Science, University Of Baghdad 24 To 26 March 2009
Bacterial DNA induces inflammations in murine renal system
...Show More Authors

Abstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 02 2014
Journal Name
Journal Of Theoretical And Applied Information Technology
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin

... Show More
Scopus (47)
Scopus
Publication Date
Sat Mar 29 2025
Journal Name
Jurnal Hama Dan Penyakit Tumbuhan Tropika
Detection and biocontrol of Tobamovirus tabaci infecting tomato in Iraq
...Show More Authors

The antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Bag

... Show More
View Publication
Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Detection of Polyomavirus BK and JC in kidney Transplant Recipients
...Show More Authors

objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio

... Show More
View Publication Preview PDF