Preferred Language
Articles
/
jcoeduw-206
A prospective study on sexual deviation deployed in Baghdad crimes
...Show More Authors

The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything noteworthy and by 1% They have maintained themselves. It found that there are a lot of crimes reticent by the media because of the social values and traditions

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Manufacturing and Testing a Double Action Feed Pellet Durability Measuring Device
...Show More Authors
Abstract<p>The experiment was aimed to evaluate a locally manufactured a dual-action device used for measuring feed pellets durability. The device performs dropping process in conventional devices, then sifting process to separate the pellets from the crumbles simultaneously, with a control the motor speed by using the pulse width modulation (PWM) Technique. The device performance was compared with the durability measuring device of a moving drop box. Rotational speed, diameter of the die holes of the machine was used in this study. The results showed that increasing the rotational speed of the die from 280 to 300 and to 320 rpm, increasing the die holes diameter from 3 to 4 and to 5 mm, led to </p> ... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Cutaneous And Aesthetic Surgery
Topical zinc sulphate (25%) solution: a new therapy for actinic keratosis
...Show More Authors

KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19

View Publication
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Drug Delivery Technology
Gold nanoparticle: Synthesis, functionalization, enhancement, drug delivery and therapy: A review
...Show More Authors

Scopus (23)
Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Aerodynamic Characteristics of a Rectangular Wing Using Non-LinearVortex Ring Method
...Show More Authors

The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky the

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Al-kindy College Medical Journal
Leigh Syndrome: Report of a Rare Case with Late Onset Presentation
...Show More Authors

Leigh's syndrome, or sub acute necrotizing encephalomyelopathy, is a rare inherited neurometabolic disease of infancy and early childhood with variable course and prognosis. Rarely, it occurs in juveniles and adults. The diagnosis is difficult and still remains to challenge the clinicians on the basis of history; hence the role of imaging is very essential. It is the neuroimaging, chiefly the Magnetic Resonance Imaging showing characteristic symmetrical necrotic lesions in the basal ganglia and/or brain stem that leads to the diagnosis. Late-onset varieties are rare and only few cases were reported all over the world. Here, I report a case of late onset (juvenile) Leigh syndrome presenting with an acute polyneuropathy. Neuroimaging confi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Fri Sep 06 2024
Journal Name
Journal Of Optics
Synthesis of N-A cysteine-capped CdTe QDs for optical biosensing
...Show More Authors

In this investigation, water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals), utilizing N-acetyl cysteine as a stabilizer, were prepared to assess their potential in differentiating between DNA extracted from pathogenic bacteria (e.g. Escherichia coli isolated from urine specimen) and intact DNA (extracted from blood of healthy individuals) for biomedical sensing prospective. Following the optical characterization of the synthesized QDs, the XRD analysis illustrated the construction of NAC-CdTe-QDs with a grain size of 7.1 nm. The prepared NAC-CdTe-QDs exhibited higher PL emission features at of 550 nm and UV-Vis absorption peak at 300 nm. Additionally, the energy gap quantified via PL and UV–Vis were 2.2 eV

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF