Preferred Language
Articles
/
jkmc-195
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Impact of different sources of noise exposure on hearing impairment: A cross- sectional study
...Show More Authors

Background: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.

Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.

Subjects and Methods:  A cross-sectional descriptive study with analytic elements was conducted in 8 famil

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Study on Catalytic Wet Air Oxidation of Phenol in a Trickle Bed Reactor
...Show More Authors

Kinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics,

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Engineering
Influence of Nanomaterial Modifiers on Fatigue Resistance of Asphalt Concrete Mixtures: A Review Paper
...Show More Authors

Enhancing fatigue resistance in asphalt binders and mixtures is crucial for prolonging pavement lifespan and improving road performance. Recent advancements in nanotechnology have introduced various nanomaterials such as alumina (NA), carbon nanotubes (CNTs), and silica (NS) as potential asphalt modifiers. These materials possess unique properties that address challenges related to asphalt fatigue. However, their effectiveness depends on proper dispersion and mixing techniques. This review examines the mixing methods used for each nanomaterial to ensure uniform distribution within the asphalt matrix and maximize performance benefits. Recent research findings are synthesized to elucidate how these nanomaterials and their mixing proce

... Show More
View Publication
Crossref
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of systemic administration of Simvastatin on dental implant stability: A random clinical study
...Show More Authors

Background: the primary objective for many researches carried out in dental implantology was to reduce the period needed for functional implant loading, simvastatin (cholesterol lowering medication) had many pleiotropic effects, one of which was increasing bone density around titanium implants (1) and subsequently establishing faster osseointegrated dental implants (2,3). This study aims to reduce the period of time needed to establish secondary stability of dental implant measured in ISQ (Implant Stability Quotient) by investigating the effect of orally administered simvastatin on bone. Materials and methods: simvastatin tablets (40mg/day for three months) were administered orally for 11 healthy women aged (40-51) years old who received 1

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
On modelling and adaptive control of a linear smart beam model interacting with fluid
...Show More Authors
Abstract<p>This paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi</p> ... Show More
View Publication
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref