Preferred Language
Articles
/
ijp-931
The Temperature Dependence of Photoconductivity in a-Ge20Se80 Thin Films
...Show More Authors

The photoconductivity and its dependence on light intensity have been investigated in a-Ge20Se80 thin films as a function of temperature between (293–323)K. The result showed that the photoconductivity and photosensitivity increase with increase of annealing temperature. This behavior is interpreted in terms of the dispersive diffusion –controlled recombination of localized electrons and holes.

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Pakistan Journal Of Medical And Health Sciences
Evaluation of Cytotoxic T-Lymphocyte Antigen 4 Polymorphism and Soluble Immune Checkpoint Level Among A Sample of Sars-Cov-2 Iraqi Patients
...Show More Authors

Objective: To Evaluate the Roley of Cytotoxic T-Lymphocytek antigen 4 Polymorphism and soluble immune checkpoint level (PD-1,PDL-1 and CTLA-4 ) in SARS-Cov-2 patients. Methods: Fromt October 2020 to April 2021, the currentk study was conducted in Baghdad-Iraq. Ninety patients with Confirmatory SARS-Cov-2 by PCR were inclusion in the study, and they were seeking treatment at Medical City in Baghdad's Teaching Hospital (BTH). Patients with SARS-Cov-2 were divided into two groups: those with Sever SARS-Cov-2 symptom and those with mild - moderate SARS-Cov-2 symptoms (cross sectional study. Patients with another form of autoimmune illness, malignant, diabetes, under the age of 18 and pregnant women were excluded. Results: Data rega

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Sep 28 2024
Journal Name
Journal Of The Pakistan Medical Association
Pulse transmission time and amplitude of digital pulse wave determined by fingertip plethysmography as a surrogate marker of brachial artery flowmediated dilatation
...Show More Authors

Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Sensors
A Novel Application of Deep Learning (Convolutional Neural Network) for Traumatic Spinal Cord Injury Classification Using Automatically Learned Features of EMG Signal
...Show More Authors

In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi

... Show More
View Publication
Scopus (10)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Feb 13 2020
Journal Name
International Journal Of Environmental Research
Synthesis of a Novel Composite Sorbent Coated with Siderite Nanoparticles and its Application for Remediation of Water Contaminated with Congo Red Dye
...Show More Authors
Abstract

Re-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c

... Show More
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Natural Sciences Research
Isolation and Characterization of Lignin from Iraqi Date Palm Phoenix Dactylifera L. Frond Bases as a Good and Cheap Source of Lignin‏
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTROL
...Show More Authors

Preview PDF
Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Achieving the book of reaction to the end of   Book of alimony from the manuscript of the Forum of the Evangelist Sheikh Ibrahim bin Mohammed bin Ibrahim Halabi (P. 956 e
...Show More Authors

Achieving the Book of Return to the End of the Book of Alimony from the Manuscript of the Forum of the Abhar of the Sheikh (Abraham Bin
Muhammad ibn Ibrahim al-Halabi (d. 956 AH), who was a member of the Hanafi sect, was a long man
Fiqh, interpretation, modernity, Arab sciences, and readings
Hanafi as well as that he was Abid Zahid and the reason for his claim to this book that asked him some
He asked him to take advantage of it
Al-Hanafiya said, mentioning the sources from which he was taken, and presented his opinion and evidence on the correct
He mentioned the issues of the Hanafi jurisprudence in his book according to the chapters of the jurisprudence
Reaction is done to what you have achieved previously in the h

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTRO
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
(comparative analysis of phraseological units in the lexical-semantic field "on the material of Arabic and Russian languages"): (сопоставительный анализ фразеологических единиц лексико-семантического поля " на материале арабского и русского языков")
...Show More Authors

Establishing the systemic character of vocabulary, its relationship with other language systems, their interdependence creates the possibility of a comprehensive scientific study and description of the lexical system of each language, as well as contrastive comparative studies of several languages, including their phraseological composition.

It is known that not all words-components of phraseological units are equivalent in their role in the formation of the semantic content of phraseological units. In this regard, it is necessary to introduce the concept of a lexical dominant. To this we include words, which are kind of centers around which the entire semantic complex of phraseological units, the entire set of its words-componen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More