Preferred Language
Articles
/
jnhm-621
IMPACT OF THARTHAR ARM WATER ON COMPOSITION AND DIVERSITY OF COPEPODA IN TIGRIS RIVER, NORTH OF BAGHDAD CITY, IRAQ
...Show More Authors

This study is considered to be the first on this sector of Tigris River after 2003, to evaluate the effect of Tharthar Arm on the composition and diversity of Copepoda in Tigris River. Six sampling sites were selected; two on the Tharthar Arm and four sites along the Tigris River, one before the confluence as a control site and the others downstream the confluence; thirty-five copepod taxa were recorded, 34 taxa in the Tigris River and 25 taxa in the Tharthar Arm.
The highest density of Copepoda was in site 2 at Tharthar Arm was 265584.2 Ind./m3 lead to an increasing in Copepoda density in Tigris River from 63878.2 Ind./m3 in site 1 before the confluence to 127198.3 Ind./m3 in site 4 immediately downstream the confluence. Also, the mean values of richness index and diversity index increased from 1.71 and 0.98 bit/Ind. in site 1 before the confluence to 2.08 and 1.00 bit/Ind. in site 4 below the confluence, respectively. Moreover, the highest similarity percentage was between sites 3 and 4 reached 87.83% while, the lowest percentage was between the sites 1 and 2 recorded 65.41%. For constancy index the highest value was 9 at the site 6 whereas the lowest value was 2 at site3.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for New COVID-19 Cases Using Recurrent Neural Networks and Long-Short Term Memory
...Show More Authors

     This research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being  0.66975075, 0.470

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
Nigella sativa Methanol Extract Inhibits PC-3 Cell Line Colonization, Induced Apoptosis, and Modulated LC3-based Autophagy
...Show More Authors

Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
The non right behavior appearance for the kindergarten children and its relation with the kindergarten teaching style
...Show More Authors

The kindergarten teacher play a role in fixing the children behavior so she must plant the value and the habits that make a positive behavior and accepted by the society so the teacher must know all the right educational psychological styles to fix the children behavior and make them accepted psychologically and socially so the problem of the research start from knowing the relation between the methods of dealing with the kindergarten’s teachers and the non right behavior appearance for the kindergarten children. The current research aims to measure the negative behavior appearance of the children of kindergarten and distinguish it according to (sex and levels) and to distinguish the most using styles by the teachers of kinderg

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Estimation the blast wave pressure effecters by apply Remote Sensing (RS) and Geographic Information System (GIS) techniques
...Show More Authors

After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 27 2012
Journal Name
Journal Of Prosthodontics
A Three-Dimensional Finite Element Analysis for Overdenture Attachments Supported by Teeth and/or Mini Dental Implants
...Show More Authors

View Publication
Crossref (14)
Crossref
Publication Date
Fri May 28 2021
Journal Name
Journal Of Microbiology And Biotechnology
Bioactive Levan-Type Exopolysaccharide Produced by <i>Pantoea agglomerans</i> ZMR7: Characterization and Optimization for Enhanced Production
...Show More Authors

View Publication Preview PDF
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Comparing Ionospheric MUF using IRI16 Model with Mid-Latitude Ionosonde Observations and Associated with Strong Geomagnetic Storms
...Show More Authors

High frequency (HF) radio wave propagation depends on the ionosphere status which is changed with the time of day, season, and solar activity conditions. In this research, ionosonde observations were used to calculate the values of maximum usable frequency (MUF) the ionospheric F2- layer during strong geomagnetic storms (Dst ≤ -100 nT) which were compared with the predicted MUF for the same layer by using IRI-16 model. Data from years 2015 and 2017, during which five strong geomagnetic storms occurred, were selected from two Japanese ionosonde stations (Kokubunji and Wakkanai) located at the mid-latitude region. The results of the present work do not show a good correlation between the observed and predicted MUF values for F2- laye

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Antimicrobial Agents And Chemotherapy
Complex Interplay between Sphingolipid and Sterol Metabolism Revealed by Perturbations to the Leishmania Metabolome Caused by Miltefosine
...Show More Authors

With the World Health Organization reporting over 30,000 deaths and 200,000 to 400,000 new cases annually, visceral leishmaniasis is a serious disease affecting some of the world's poorest people. As drug resistance continues to rise, there is a huge unmet need to improve treatment. Miltefosine remains one of the main treatments for leishmaniasis, yet its mode of action (MoA) is still unknown. Understanding the MoA of this drug and parasite response to treatment could help pave the way for new and more successful treatments for leishmaniasis. A novel method has been devised to study the metabolome and lipidome ofLeishmania donovaniaxenic amastigotes treated with miltefosi

... Show More
View Publication
Scopus (32)
Crossref (32)
Scopus Clarivate Crossref