Preferred Language
Articles
/
jeasiq-2281
Using Genetic Algorithm to Estimate the Parameters of the Gumbel Distribution Function by Simulation
...Show More Authors

In this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as  the Bayes method. The comparison was made using the mean error squares (MSE), where the best  estimator  is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 02 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Validity of Testicular Biopsy Among Azoospermic Patients Prior to Intracytoplasmic Sperm Injection
...Show More Authors

Objective: To evaluate the clinical significance of open diagnostic testicular biopsy as prognostic predictor of
successful sperm retrieval among azoospermic infertile patients.
Design: Prospective study.
Setting: Infertility clinic and assisted reproduction unit at the institute of embryo research and infertility
treatment, Baghdad University.
Patients: Sixty infertile azoospermic patients.
Intervention: Pieces of testicular tissue taking during open diagnostic multiple bilateral testicular biopsies was
prepared for histological examination and grouped according to well-defined histopathological patterns.
Measurement of testicular size and serum reproductive hormones (FSH, LH, Testosterone, and PRL) were done

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Histological and Physiological Studies on the Long-term Effect of Different Concentrations of Energy Drink (Tiger) on the Renal and Hepatic Systems of Young Mice
...Show More Authors

The present study aims to investigate the long-term histopathological, and physiological effects of different concentrations of a commercially available energy drink (Tiger) on liver and kidney of young mice. Sixteen Balb/c male mice,6 -week old, were divided into 4 groups (n=4). Two groups consumed the energy drink at a concentration of 28µl energy drink/ml water. One group were killed after 10 days (T1), another group were killed after 20 days (T2). Other group of mice consumed the energy drink at a final concentration of 14µl/ml for 20 days (T3). The last group was provided only with water and served as control. Mice of all groups drank around 3 ml per day. The histopathological study on liver of treated groups showed many changes s

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Biochemical and Histological Study of Aminoacylase-1 Purified from Amniotic Fluid in Rats with Oxidative Stress Induced by Lead Acetate
...Show More Authors

This work involves separating and studying the aminoacylase-1 (ACY1) of amniotic fluid from healthy pregnant, mainly one peak with higher activity has been isolated by DEAE-Cellulose ion exchange from the proteinous supernatant produced by deposition of proteins using ammonium sulfate  (65%) after dialysis. The purification folds reaching to 19 folds also gave one protein peak when injected into the gel filtration column, a high ACY1 purity was obtained, with 38 folds of purification. It was found that the molecular weight of the isolated ACY1 was up to 46698 Dalton when using gel chromatography technique.The effect of ACY1 isolate was studied on rats with oxidative stress caused by lead acetate(LA) at 40 mg / kg body weight and compare

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Hemorrhoidectomy Using (10600 nm) CO2 Laser
...Show More Authors

Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref