Preferred Language
Articles
/
jcoeduw-1117
Space-Charge Effect on the Theoretical Design of Enzil Lens
...Show More Authors

The presentwork is a theoretical study in the field of charged particle optics. It concentrates on the design of electrostatic enzil lens for focusing charge particles beams, using inverse method in designingthe electrostatic lens. The paraxial ray equation was solved to obtain the trajectory of the particles, the optical properties such as the focal length and spherical and chromatic aberration coefficients were determined. The shape of the electrode of the electrostatic lens were determined by solving poison equation and the results showed low values of spherical and chromatic aberrations, which are considered as good criteria for good design.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Ultrasound Images Registration Based on Optimal Feature Descriptor Using Speeded Up Robust Feature
...Show More Authors

Image registration plays a significant role in the medical image processing field. This paper proposes a development on the accuracy and performance of the Speeded-Up Robust Surf (SURF) algorithm to create Extended Field of View (EFoV) Ultrasound (US) images through applying different matching measures. These measures include Euclidean distance, cityblock distance, variation, and correlation in the matching stage that was built in the SURF algorithm. The US image registration (fusion) was implemented depending on the control points obtained from the used matching measures. The matched points with higher frequency algorithm were proposed in this work to perform and enhance the EFoV for the US images, since the maximum accurate matching po

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Iraqi Breast Cancer: A Review on Patients' Demographic Characteristics and Clinico-Pathological Presentation.
...Show More Authors

Background: Breast Cancer is the commonest type of malignancy in Iraq. The Iraqi Cancer Registry displays an obvious trend for the disease to affect younger women with advanced stages at the time of presentation. This report presents a review on the main demographic characteristics and clinicopathological parameters in Iraqi patients diagnosed with breast cancer.
Patients & Methods: The study was carried out on 721 out of a total of 5044 patients (14.3%) who complained of palpable breast lumps that were diagnosed as cancer. The procedure for tumor nuclear DNA Ploidy assessment was performed by means of Image Cytometry. Immuno-cytochemical and  histochemical assays were applied for the determination of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Iraqi Journal Of Science
Diagenesis Processes Impact on Reservoir Quality in Carbonate Yamama Formation /Faihaa Oil Field
...Show More Authors

The Yamama Formation is a significant reservoir in the southern part of Iraq. This formation consists of limestone deposited throughout the Lower Cretaceous period within main retrogressive depositional series. This study aims to identify the impact of the diagenesis processes on the reservoir’s characteristics (porosity and permeability). Diagenesis processes’ analysis and the identification of Yamama Formation depended on the examination of more than 250 thin sections of the core samples from two wells that were used to determine different diagenetic environments and processes. The three identified diagenetic environments that affected Yamama reservoir were the marine, meteoric and burial environments. Eight diagenetic pr

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Sandwich Subordinations Imposed by New Generalized Koebe-Type Operator on Holomorphic Function Class
...Show More Authors

     In the complex field, special functions are closely related to geometric holomorphic functions. Koebe function is a notable contribution to the study of the geometric function theory (GFT), which is a univalent function. This sequel introduces a new class that includes a more general Koebe function which is holomorphic in a complex domain. The purpose of this work is to present a new operator correlated with GFT. A new generalized Koebe operator is proposed in terms of the convolution principle. This Koebe operator refers to the generality of a prominent differential operator, namely the Ruscheweyh operator. Theoretical investigations in this effort lead to a number of implementations in the subordination function theory. The ti

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Low computations in compression image schemes using Cache codebook based on Weber's law
...Show More Authors

In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.

View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Familial Pulmonary Alveolar Microlithiasis: A Rare Case Report with Emphasis on Imaging Findings
...Show More Authors

ABSTRACT Pulmonary alveolar microlithiasis is rare infiltrative pulmonary disease characterized by intra-alveoli deposition of microliths. We present a familial case of an adult female with complaint of progressive shortness of breath on exertion. Chest radiograph showed innumerable tiny dense nodules, diffusely involving both lungs mainly the lower zones. High-resolution CT scan illustrated widespread intra-alveolar microliths, diffuse ground-glass attenuation areas and septal thickening predominantly in the basal regions. Chest radiograph is all that is needed for the diagnosis of this case but CT scan was done to demonstrate the extent and severity of this disease

View Publication Preview PDF