Preferred Language
Articles
/
ijs-2722
The Effects of the Aqueous Extract of the Leaves of the Local Plant Eruca sativa on Lipid Profile and Some Minerals in the Blood of Male White Mice
...Show More Authors

Eruca sativa, commonly known as rocket salad, is a popular vegetable to which a wide range of health benefits are attributed. This study aimed to examine the effects of the aqueous extract of E. sativa leaves on lipid profile and some minerals, such as calcium and magnesium, in blood of male albino mice under normal physiological condition. Two experiments were separately conducted, each with eighteen male albino mice divided into 3 equal groups, which included control, treated group (1), and treated group (2) which were orally administrated with 0, 0.2 and 0.4 mg/kg body weight, respectively, of the leaves extract for 28 days. In the first experiment, serum lipid profile, including cholesterol, triglyceride, HDL, LDL and VLDL, were estimated. In the second experiment, serum calcium and magnesium were estimated. The results showed that E. sativa have effects on lipid profile by decreasing cholesterol, triglyceride, and LDL levels, but increasing that of HDL. In addition, E. sativa increased the levels of both calcium and magnesium. This study concludes that E. sativa leaves exerts possibly beneficial effect on lipid profile and calcium and magnesium levels in albino male mice under normal conditions.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Mixed Implicit Galerkin – Frank Wolf, Gradient and Gradient Projection Methods for Solving Classical Optimal Control Problem Governed by Variable Coefficients, Linear Hyperbolic, Boundary Value Problem
...Show More Authors

This paper deals with testing a numerical solution for the discrete classical optimal control problem governed by a linear hyperbolic boundary value problem with variable coefficients. When the discrete classical control is fixed, the proof of the existence and uniqueness theorem for the discrete solution of the discrete weak form is achieved. The existence theorem for the discrete classical optimal control and the necessary conditions for optimality of the problem are proved under suitable assumptions. The discrete classical optimal control problem (DCOCP) is solved by using the mixed Galerkin finite element method to find the solution of the discrete weak form (discrete state). Also, it is used to find the solution for the discrete adj

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Education College Wasit University
تقصي فاعلية التعليم الالكتروني خلال فيروس كورونا المستجد (كوفيد 19) في كلية التربية للبنات/ جامعة بغداد
...Show More Authors

      تبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه  مع انتشار جائحة كورونا اصبح التعليم الالكتروني  ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية.  تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Essential-Small M-Projective Modules
...Show More Authors

In this paper, we introduce the concept of e-small M-Projective modules as a generalization of M-Projective modules.

View Publication Preview PDF
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Serum Biomarkers are Promising Tools to Predict Traumatic Brain Injury Outcome
...Show More Authors

Traumatic Brain Injury (TBI) is still considered a worldwide leading cause of mortality and morbidity. Within the last decades, different modalities were used to assess severity and outcome including Glasgow Coma Scale (GCS), imaging modalities, and even genetic polymorphism, however, determining the prognosis of TBI victims is still challenging requiring the emerging of more accurate and more applicable tools to surrogate other old modalities

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Designing an E-marketing Website for Sustainable Fashion: صيته بنت محمد المطيري .....بشاير يوسف التويجري .....روان يوسف العلي....شهد عبد الحكيم المقرن
...Show More Authors

The importance of websites appears as a modern tool that helps people connect with each other and exchange information rapidly. An increase number of new websites have been created in public or private spheres, which benefit individuals and society as a whole. This research aims to design a website specialized in marketing sustainable fashion that meets the needs of the Saudi market. It followed a descriptive and analytical approach. A survey has been conducted on a random sample of e-marketing users. The sample number is 101 users. The study resulted in: Determining the effectiveness of e-marketing, studying consumer purchasing tendencies, and designing a website for sustainable fashion based on the survey’s results. The study recomme

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res

... Show More
View Publication Preview PDF
Crossref (6)
Crossref