Preferred Language
Articles
/
jih-643
The Commutator of Two Fuzzy Subsets
...Show More Authors

In this paper we introduce the idea of the commutator of two fuzzy subsets of a group and study the concept of the commutator of two fuzzy subsets of a group .We introduce and study some of its properties .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 25 2014
Journal Name
Journal Of Petroleum Geology
SEQUENCE STRATIGRAPHIC ANALYSIS OF THE MID‐CRETACEOUS MISHRIF FORMATION, SOUTHERN MESOPOTAMIAN BASIN, IRAQ
...Show More Authors

The middle Cenomanian – early Turonian Mishrif Formation, a major carbonate reservoir unit in southern Iraq, was studied using cuttings and core samples and wireline logs (gamma‐ray, density and sonic) from 66 wells at 15 oilfields. Depositional facies ranging from deep marine to tidal flat were recorded. Microfacies interpretations together with wireline log interpretations show that the formation is composed of transgressive and regressive hemicycles. The regressive hemicycles are interpreted to indicate the progradation of rudist lithosomes (highstand systems tract deposits) towards distal basinal locations such as the Kumait, Luhais and Abu Amood oilfield areas. Transgressive hemicycles (transgressive systems tract deposits)

... Show More
View Publication
Scopus (107)
Crossref (75)
Scopus Clarivate Crossref
Publication Date
Thu Feb 09 2017
Journal Name
International Journal Of Pharmacy Practice
Factors influencing the degree of physician–pharmacist collaboration within Iraqi public healthcare settings†
...Show More Authors
Abstract<sec> <title>Objectives

Medication safety and effectiveness can be improved through interprofessional collaboration. The goals of this study were to measure the degree of physician–pharmacist collaboration within Iraqi governmental healthcare settings and to investigate factors influencing this collaboration.

Methods

This cross-sectional study was conducted in Al-Najaf Province using the Collaborative Working Relationship Model and Physician–Pharmacist Collaborative Instrument (PPCI). Four phar

... Show More
View Publication
Scopus (18)
Crossref (13)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Dentistry
The in-vitro development of novel enzyme-based chemo-mechanical caries removal agents
...Show More Authors

Objectives Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficiency

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
P J M H S
The influence of Breast Cancer Molecular Subtypes on Metastatic pattern in Iraqi patients
...Show More Authors

Scopus (2)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Jpras Open
The utility of a novel vacuum-assisted foreign body extraction technique from wounds
...Show More Authors

Retained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Legal Sciences
Judicial tools in the development of civil law rules ( France as a model )
...Show More Authors

Despite the principle of separation of powers brought by the French Revolution, which entrusted the task of drafting legislation and its amendment to the legislative authority and the task of settling disputes and settling them in the judiciary. However, since that date, the French judiciary has played a major role in the development of French civil law (In spite of all the economic and social developments that have taken place in French society throughout these years) since its promulgation until February of 2016, the date of the Legislative Decree No. 131 of the year 2016 A modification is the largest in the history of the French Civil Code (which was the judicial precedents in which a significant impact), was assisted by the French judic

... Show More
View Publication
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Legal Sciences
Compensation those affected by technological development risks within the scope of medical works
...Show More Authors

those affected by technological development risks within the scope of medical works. The unprecedented technological development the world witnesses nowadays has been providing brilliant medical service to the human being including examination, diagnosis and the treatment or follow up. However, such works hide behind potential risks threatening people's lives and such risks my be discovered within the limits of now – how and technical knowledge prevailing the time of rendering the medical service. Also this the question is raised on how to keep up between the safety of the patients and such risks are being unknown by the provider and questioning them contradicts the justices. subsequently, can the patients (affected) acquire the compensat

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Investigation of the optimum cutting conditions during turning aluminum alloy using Taguchi method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref