Preferred Language
Articles
/
jnhm-95
A DESCRIPTION STUDY OF TWO LOCAL FISH HIMRI CARASOBARBUS LUTEUS (Heckel, 1843)(CYPRINIFORMES: CYPRINIDAE) AND HISHNI LIZA ABU (Heckel, 1843) (MUGILOIDEI : MUGILIDAE) BY BONES STAINING METHOD
...Show More Authors

    Two local fish Himri Carasobarbus luteus (Heckel, 1843)  and Hishni Liza abu (Heckel, 1843) were stained with Alizarin Red and featured some anatomical qualities which cleared the difference of the muscular and skeletal fabric for each fish. Since clear Histologic differences appeared in these two species, it was intended from this study the possibility of adopting a diagnosis between local fish species by staining bones and tissues.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 16 2019
Journal Name
Al-khwarizmi Engineering Journal
Study of Transverse and Longitudinal Crack Propagation in Human Bone Using the Finite Element Method with MATLAB
...Show More Authors

A finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Removal of Cu2+, Pb2+ , And Ni 2+ Ions From Simulated Waste Water By Ion Exchange Method On Zeolite And Purolite C105 Resin
...Show More Authors

The removal of heavy metal ions from wastewater by ion exchange resins ( zeolite and purolite C105), was investigated. The adsorption process, which is pH dependent, shows maximum removal of metal ions at pH 6 and 7 for zeolite and purolite C105 for initial metal ion
concentrations of 50-250 mg/l, with resin dose of 0.25-3 g. The maximum ion exchange capacity was found to be 9.74, 9.23 and 9.71 mg/g for Cu2+, Pb2+, and Ni2+ on zeolite respectively, while on purolite C105 the maximum ion exchange capacity was found to be 9.64 ,8.73 and 9.39 for Cu2+, Pb2+, and Ni2+ respectively. The maximum removal was 97-98% for Cu2+ and Ni2+ and 92- 93% for Pb2+ on zeolite, while it was 93-94% for Cu2+, 96-97% for Ni2+, and 87-88% for Pb2+ on puroli

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Regenerative Therapy
In vitro periodontal ligament cell expansion by co-culture method and formation of multi-layered periodontal ligament-derived cell sheets
...Show More Authors

Objective: Per-implantitis is one of the implant treatment complications. Dentists have failed to restore damaged periodontium by using conventional therapies. Tissue engineering (stem cells, scaffold and growth factors) aims to reconstruct natural tissues. The paper aimed to isolate both periodontal ligament stem cells (PDLSCs) and bone marrow mesenchymal stem cells (BMMSCs) and use them in a co-culture method to create three-layered cell sheets for reconstructing natural periodontal ligament (PDL) tissue. Materials and methods: BMMSCs were isolated from rabbit tibia and femur, and PDLSC culture was established from the lower right incisor. The cells were co-cultured to induce BMMSC differentiation into PDL cells. Cell morphology, stem cel

... Show More
View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Nov 05 2014
Journal Name
International Journal Of Applied Mathematical Research
Approximate solution of a model describing biological species living together using a new iterative method
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The market value between the two dilemmas of profit distribution and retention: an analytical study in the Iraqi stock market
...Show More Authors

Abstract:

             The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Validety of total laryngectomy Under local anaesthesia
...Show More Authors

BackgroundCarcinoma of the larynx represent 10% of head & neck malignancies. The treatment of advanced carcinoma of larynx may include partial or total laryngectomy, with or without laser , radiotherapy,and or chemotherapy . Carcinoma of the larynx usually affect old age , heavy smoker with possible risk of pulmonary diseases & ischemic heart disease , which add risk to the general anaesthetic complication operative & postoperative - Objectives this study was designed to assess the feasibility of total laryngectomy under local anaesthesia in medically unfit patients for general anaesthesia & to re-establish practice doing total laryngectomy under local anaesthesia in those patients.
Methods a prospective study on 12 pa

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Validety of total laryngectomy Under local anaesthesia
...Show More Authors

BackgroundCarcinoma of the larynx represent 10% of head & neck malignancies. The treatment of advanced carcinoma of larynx may include partial or total laryngectomy, with or without laser , radiotherapy,and or chemotherapy . Carcinoma of the larynx usually affect old age , heavy smoker with possible risk of pulmonary diseases & ischemic heart disease , which add risk to the general anaesthetic complication operative & postoperative - Objectives this study was designed to assess the feasibility of total laryngectomy under local anaesthesia in medically unfit patients for general anaesthesia & to re-establish practice doing total laryngectomy under local anaesthesia in those patients.
Methods a prospective study on 12 pa

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref