Preferred Language
Articles
/
injns-64
Effect of Iodine Overdose on Thyroid Hyperplasia
...Show More Authors

Objectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (hormonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland (hormonal and histological changes) related with
time. The study last for six months for the period of 1/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology department, College of Medicine, University of Baghdad.
Results: The study shows changes in hormonal levels of thyroid hormones (T3 & T4) and also histological
changes in the diameter and numbers of thyroid follicles and increase in the numbers of active hot follicles and
decrease in the numbers of inactive cold follicles. The hot follicles takes faint blue colour after using the toluiden
blue dye to stain the thyroid tissue while the cold follicles takes deep dark blue colour in the thyroid gland
section when using the same dye.
Recommendations: Carrying out such a study for long time duration (1year or more), and to study the
correlation between the experimental results and the behavior of the human, and study the effect of iodine in
different concentrations in mixture with thyroxin hormone.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
PDCNN: FRAMEWORK for Potato Diseases Classification Based on Feed Foreword Neural Network
...Show More Authors

         The economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work  is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Fri Mar 04 2022
Journal Name
Journal Of Water Resources And Geosciences
A Review Study on Gypseous Soils Stabilized with Different Additives in Iraq
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Biotechnology
BIOCHEMICAL STUDY ON SUPEROXIDE DISMUTASE ENZYME IN PATIENTS WITH DIFFERENT BRAIN TUMORS
...Show More Authors

The aim of the current study is to in evaluate the role of SOD activity in the previously reported oxidative stress in our laboratory(1), in the patients with different brain tumors. SOD activity was assayed according to riboflavin/NBT method and its specific activity was calculated in patients with benign and malignant brain tumors and control. Moreover the specific activity was compared in these samples according to gender and the occurrence of disease.Non significant elevation (P > 0.05) in SOD specific activity was observed in tissue of malignant tumors in comparison to that of in benign brain tumors. While a highly significant decrease (P < 0.001) of the specific activity was found in sera of malignant patients group in comparison to t

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Al-nahrain University Science
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 15 2024
Journal Name
Iraqi Statisticians Journal
Estimate a nonparametric copula density function based on probit and wavelet transforms
...Show More Authors

This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log

... Show More
View Publication
Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings
...Show More Authors

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Apr 15 2020
Journal Name
Al-mustansiriyah Journal Of Science
Adaptation Proposed Methods for Handling Imbalanced Datasets based on Over-Sampling Technique
...Show More Authors

Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE),  Border

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More