Preferred Language
Articles
/
jkmc-280
A serology conundrum – HIV infection in acute babesiosis infection could merely be a false positive result
...Show More Authors

Babesiosis is a tick-borne disease caused by Babesia microti. We present a case of false positive HIV in the setting of confirmed babesiosis infection. An understanding that patients with babesiosis can have a false positive HIV test result is important in management decisions.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Surgical Case Reports
A rare variant of mirror hand deformity
...Show More Authors

Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.

Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Jurisprudence and its controls - A Comparative study
...Show More Authors

Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont

... Show More
View Publication
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Expropriation of foreign investments - a comparative study
...Show More Authors

The right to property is one of the most prominent and most important of the fundamental rights that the individual enjoys, whether national or foreign, both of them have their own private property that may not be affected except for the requirements of the country's economic development or what is known as the public benefit, and the Iraqi legislator did not specify what is meant by the removal of foreign investment. Of the bilateral international agreements (BITS), as it determined its terms and methods, the properties of foreign investors may be expropriated in a direct and indirect way.

View Publication
Publication Date
Mon Jan 01 2007
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Herbal activation of mammary gland; a comparative
...Show More Authors

Seventy five adult virgin female Norway rats (60 experimental and 15 controls) were used toevaluate the effect of seeds of three herbs (Fennel, Cumin and Garden cress) on their mammaryglands. Experimental animals were fed with these herbs (each type of herb seeds was given to twentyexperimental rats) for fourteen days. Rats were sacrificed and mammary gland sections wereobtained, stained then morphometrically assessed. Serum prolactin level was performed too.Results revealed that Garden cress seeds are the strongest lactogenic agent among the three. BothFennel and Cumin seeds were shown to be very weak galactagogues.

Publication Date
Mon May 11 2020
Journal Name
Journal Of Arts, Literature, Humanities And Social Sciences
The Kite Runner; A Journey of Growth
...Show More Authors

View Publication
Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref