Preferred Language
Articles
/
jih-1369
Visceral Leishmaniasis (Anew Approach in diagnosis)
...Show More Authors

This Study· is to investigate the Visceral LeishmaniEJ,sis among 8

susp<:;cted   infants and  young chUdren admitted  1o  AI-Khadhtmiya

Pediatric  Hospital   in Baghdad  between  January  1,2005 o August

31,2005  .For  each  patieni,   a  medical   history  was  obtained  and   a complete physical  examination  was  performed   by physicians  . The serums  of  the .suspected  c_es  were primarily diagnosed by using a new ,simple diagnostic method  bas.ed  on detecting antib9dies  against the  recombinant  K 39  antigen   by innnunochromatographic format

 

(Dipstick  test).  The positei

 

cases.  were sent  to  the  Central  Health

 

Laboratory   in   Baghdad  to  he  confirmed   by  indirect   fluorescent antibody  test QFAT)with speCial chart for notifying  the patient's residency in details .

The ihcidence  of infection was (J 2%)1  most  patients  were from males and the majority  of cases were from Baghdad  .The study also showed the investigators evaluation  for performance of the test and its s nsitivity and specificUy  in different  endemic  areas  which proved that  the test  is ·a new, simple ,and specific reli_a le diagnostic  method and ()oulcl _be used for the primary diagnosis ,of endemie foci in remote areas which have poor access to health services _

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytical Study of Soret and Dufour effect in the Electro-osmotic peristaltic flow of Rabinowitsch fluid model
...Show More Authors

The present paper concerned with study the of combined electro-osmotic peristaltic transport with heat and mass transfer which is represented by the Soret and Dufour phenomenon with the presence of the Joule electrothermal heating through a microchannel occupy by Rabinowitsch fluid. The unsteady two-dimensional governing equations for flow with energy and concentration conservation have been formed in a Cartesian coordinate system and the lubrication theory is applied to modify the relevant equations to the problem. The Debye-Hukel linearization approximation is utilizing to modify the electrohydrodynamics problem. The expressions for the axial velocity, the temperature profile, the concentration profile, and the volumetric flow rate are

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research &amp; Development
The Role of Salivary Cortisol and <i>Mutans Streptococci</i> in the Development of Early Childhood Caries
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Elements of the economic intelligence of the organization and its role in achieving economic growth: Applied research
...Show More Authors

   The aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS)  to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).

 The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Title Is "The Ways Of Activating Factors Of Non-Investment Economic Growth In The Developing Countries"
...Show More Authors

The Results of Theoretical Studies and Experiment of Advanced Economies , Have Been Proven That Investment Expenditure Is Not The Only Factor And The Main Source of Production Growth, But Efficient Using Of The Fixed Assets Is More Important In This Process, All That Depends On Groups of Factors Called The Non-Investment Economic Growth,  That Are Un-bodied Technical Progress With Organizational Nature.

It's Distinguished Features That it has An Influence on The Production Growth Without Any Large Additional Investment Expenditure Or Any Additional Increment in Inputs And That Can Not Be Reached Without Activating The Factors of Non-Investment Economic Growth, Which is Still Affecting Negatively In T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Assessment of the Level of Trace Metals in Commonly Edible Vegetables and Fruits of Baghdad City (Iraq)
...Show More Authors

A study was carried out to determine the concentrations of trace metals in vegetables and fruits, which are locally available in the markets of Baghdad-samples of fourteen varieties of vegetables and fruits, belonging to Beta vulgaris, Brassica rapa, Daucus carota, Allium cepa, Eurica sativa, Malva silvestris, Coriandrum Sativum, Trigonella Foenum craecum, Anethum graveolens, Barassica oleracea, Phaseolus vulgaris, citrus reticulata, Pyrus malus, and Punica granatum. Analysis for Cd,Pb, Mn, Fe, Co, Ni, Cu and Zn were determined by flame atomic absorption spectrophotometry. The results indicated that the Malva silvestris recorded the highest concentrations of Cd and Mn while Allium cepa showed the highest concentrations of Pb and Cu. But

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Rigid Trunk Sewer Deterioration Prediction Models using Multiple Discriminant and Neural Network Models in Baghdad City, Iraq
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Nurses’ Knowledge Concerning the Infection Control Guideline in Baghdad Teaching Hospital
...Show More Authors

Objectives: the study aims to findout the effectiveness of educational program concerning infection control guideline on nurses, and to find out the relationship between effectiveness of program and types of hospital unit, age, level of education, and years of experience of nurses. Methodology: A quasi-experimental design study was carried out in Baghdad teaching hospital in the wards, for the period of December, 20th 2013 to September, 30th of July 2014, The study samples is composed of (60) nurses who have been actually working in the medical ward, blood disease, psychiatric ward, and neurological war

... Show More
View Publication Preview PDF