Preferred Language
Articles
/
ijl-66
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 445mJ pulse energy has been used to induce the acoustic wave signal in these targets. The acoustic signal is then filtered and analyzed to construct the target image. The analysis of experimental data and image construction has been accomplished using matlab software. The measurement analysis showed reasonable agreement between the estimated object dimension and the actual object size. The error in fish heart object dimension ranged from -14% to +9%, and the maximum error in Blood sac object dimension was -55%. The object dimensional error increased to -92% when the laser spot was magnified from 2mm to 45mm (to cover the phantom area) as the energy density decreases significantly.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Spectroscopic study for plasma parameters in co-sputtering system
...Show More Authors

In this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Comparison Study in Sarcasm For University of Baghdad Staff
...Show More Authors

Sarcasm is conceders one patterns of undesirable communication, which causes social problems in humans relationships because of the contradictory verbal and nonverbal expressions is known sarcasm may defined , statements with intent to belittle others in different situations, dealing with the individual deliberately, to diminish the will or overwhelmed by the recipe stupid, which generate a reaction when a person listener, raising the intentions of ridicule and undermine it, and this may happen is different from the irony interest increased in sarcasm since the development of scientists "Watzlawick '" and Bevin "Jackson's" in 1967 theory interactive and considered the sarcasm one interaction patterns in the social relationship, which use

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A study for Bacterial Infection in Acute Diarrhea Patients
...Show More Authors

500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 07 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Investigation of Corchorus olitorius L. Leaves Cultivated in Iraq and it’s In Vitro Antiviral Activity
...Show More Authors

The aim of our study was to investigate the antiviral activity of the Corchorus olitorius family Tiliaceae cultivated in Iraq against measles virus, and to demonstrate an overview about chemical constituents and pharmacological activity of Corchorus olitorius L.

About150 gm Leaves of Corchorus. olitorius were defatted by maceration in hexane for 24 hrs. The defatted plant materials were subjected for extraction after filtration using Soxhlet apparatus, with aqueous methanol 85% as a solvent extraction for 24 hours, the extract was filtered, and the solvent was evaporated under reduced pressure using a rotary evaporator to get a dry extract of about 12 gm. About 4 gm from the residue was suspended in 100

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 18 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Preparation and In-Vitro Evaluation of Floating Oral In- Situ Gel of Montelukast Sodium (Conference Paper) #
...Show More Authors

Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation, in vitro and ex-vivo Evaluation of Mirtazapine Nanosuspension and Nanoparticles Incorporated in Orodispersible Tablets
...Show More Authors

          The objective of the present investigation was to enhance the solubility of practically insoluble mirtazapine by preparing nanosuspension, prepared by using solvent anti solvent technology. Mirtazapine is practically insoluble in water which act as antidepressant .It was prepared as nano particles in order to improve its solubility and dissolution rate. Twenty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-90), poly vinyl alcohol (PVA), poloxamer 188 and poloxamer 407. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 1 and 1:2. The prepared nanoparticles were evaluated for

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref