Preferred Language
Articles
/
jkmc-303
A Comparison of Sagittal Sections of Short T1inversion Recovery and T2 Weighted Fast Spin Echo Magnetic Resonance Sequences for Detection of Multiple Sclerosis Spinal Cord Lesions
...Show More Authors

Background: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement, patients were imaged with sagittal short tau inversion recovery sequences and sagittal T2 weighted. Results: The mean age of the patients was 32.5 ± 6.7years; female to male ratio was 2.7:1. The total number of spinal cord MS lesions was 44 of them 86.4% in the cervical spine, 68.2%of the lesions had less than one vertebra extension,79.6% of the lesions did not show changes in the spinal cord morphology. There was a significant upgrading in the lesions conspicuity at short tau inversion recovery sequence comparing to T2 weighted image, P<0.001. A significant difference had been found in artifact grading between both sequences; P<0.001. Conclusions: short tau inversion recovery magnetic resonance image sequences improve detection of MS spinal cord plaques compared with T2 weighted image and itincreasesthe conspicuity of the visualized T2weighted image lesions, but also it accentuates theartifacts more than T2weighted image.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
DETECTION OF BACTERIAL INFECTIONS AND THEIR RESISTANCE IN BURN WOUND OF SKIN
...Show More Authors

Scopus
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Detection of Mineral and Microbial Contaminants in some Types of Imported Meat
...Show More Authors
Abstract<p>The main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count, <italic>Staphylococcus</italic> bacteria, <italic>Salmonella</italic> bacteria). The results showed highest number of total bacterial count 13×10<sup>5</sup> CFU/g in F8 bra</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Design and Construction of a Dust Detection System using Infrared Laser: The Case of Dust Storms in Baghdad in the Summer 2022
...Show More Authors

Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.

The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 23 2022
Journal Name
Baghdad Science Journal
Comparison Between Deterministic and Stochastic Model for Interaction (COVID-19) With Host Cells in Humans
...Show More Authors

In this paper, the deterministic and the stochastic models are proposed to study the interaction of the Coronavirus (COVID-19) with host cells inside the human body. In the deterministic model, the value of the basic reproduction number   determines the persistence or extinction of the COVID-19. If   , one infected cell will transmit the virus to less than one cell, as a result,  the person carrying the Coronavirus will get rid of the disease .If   the infected cell  will be able to infect  all  cells that contain ACE receptors. The stochastic model proves that if  are sufficiently large then maybe  give  us ultimate disease extinction although ,  and this  facts also proved by computer simulation.

View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Maximum Likelihood and Bayesian Methods For Estimating The Gamma Regression With Practical Application
...Show More Authors

In this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Detection of zpx gene of Cronobacter sakazakii isolated from Clinical samples for Iraqi children under Two Years
...Show More Authors

The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, (Central Children Hospital and Children's Protections Educational Hospital) The Iraqi Ministry of Health, the Department of Health Baghdad .the period from the first of 2015 September to the first of December 2015, Were obtained isolates bacterial subjected to the cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system .The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar, golden yellow color on the Trypton Soy agar and green color on t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
The Determination of Lower Limit Detection of X-Ray Fluorescence for Zinc Powder Suspended in Engine Oil
...Show More Authors

In this work Different weight of pure Zinc powder suspended particles in 4ml base engine Oil were used.
Intensity of Kα Line was measured for the suspended particles ,also for mixture which consist from Zinc particle blended with Engine base Oil. Calibration Curve was drawn between Ikα line Intensity and Zinc concentration at different operation condition. The Lower Limit detection (LLD) and Sensitivity (m) of Spectrometer were determined for different Zinc Concentration (Wt%). The results of LLD and m for Samples were analyzed at Operation Condition of 30KV,17mA is best from Samples were analyzed at Operation Condition of 25KV,15mA

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Estimating concentration of toxic ions Arsenic in water by using Photonic Crystal Fiber based on Surface Plasmon Resonance (SPR)
...Show More Authors

In this work, an enhanced Photonic Crystal Fiber (PCF) based on Surface Plasmon Resonance (SPR) sensor using a sided polished structure for the detection of toxic ions Arsenic in water was designed and implemented. The SPR curve can be obtained by polishing the side of the PCF after coating the Au film on the side of the polished area, the SPR curve can be obtained. The proposed sensor has a clear SPR effect, according to the findings of the experiments. The estimated signal to Noise Ratio (SNR), sensitivity (S), resolution (R), and Figures of merit (FOM) are approaching; the SNR is 0.0125, S is 11.11 μm/RIU, the resolution is 1.8x〖10〗^(-4), and the FOM is 13.88 for Single-mode Fiber- Photonic Crystal Fiber- single mode Fiber (SMF-P

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref