Preferred Language
Articles
/
jcoeduw-1022
Effect of some air pollutants (sticking minutes and lead) on human health

Air pollution is one of the complex problems plaguing the environment at the present time
as a result of many liberation of gases, vapors and fumes of fuels and chemicals resulting
from industrial activities . It should be noted that there are some elements of the heavy (Heavy
Metals), including toxic in the air, with different concentrations in the air depending on the
nature of the area, for example be in rural areas is lower than in cities or industrial areas as
measured parts million (ppm ) or parts per billion (ppb). Some of these important elements in
the physiological processes and enzymatic organisms but become toxic and Qatlhand-increase
Tercisahaan the permissible limits Bhave nature ,The air contaminant containing the lingering
minutes, lead and heavy metals have bad effects on human health, causing various diseases.
So the goal of this study to know Atrthelot the air in minutes lingering element lead on human
health through to identify the causes of serious air pollution first and then the impact of all of
the outstanding minutes and lead to human health.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Scopus (32)
Crossref (10)
Scopus Crossref
View Publication
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Molecular Genetics Study on Autistic Patients in Iraq

This study reflected on the relationship between contactin associated protein-like
2 gene (CNTNAP2) and autism spectrum disorders. The study includes forty autistic
patients and forty non autistic children as control groups (twenty unaffected sibling
and twenty unrelated children). DNA was extracted from Blood samples for
molecular detection of CNTNAP2 mutations associated with ASDs by using
Polymerase Chain Reaction (PCR) technique and sequencing analysis. PCR reaction
was performed to amplify exon 20 of CNTNAP2 gene. The PCR results revealed that
identical bands related to exon 20 of CNTNAP2 gene were present in all samples.
Therefore, five samples (four from autistic patients and one from control sibling)
we

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 06 2017
Journal Name
International Journal Of Science And Research (ijsr)
Facing Uncertainty Dimensions by Depending on Strategic Conversation,

The research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Survey study on Cholera Disease in South Baghdad

The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Scopus (2)
Scopus
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

Scopus Crossref
View Publication Preview PDF