Preferred Language
Articles
/
joe-1614
Comparative Study on the Hardness of Mechroha Water Springs
...Show More Authors

The vacancy of natural resources is undoubtedly limited by time. The sustainable development principle recommends modern technology for its protection and renewal. This project conducted analyses on two underground water sources in the north of Algeria (Mechroha Province). Besides, the use of the hardness factor and the adoption of the titration method, which is  the determining the concentration of an unknown solution using a known solution concentration, have permitted the characterization of the examples taken and to verify their conformity to the standard required, the results found showed HT=6.66 French degrees (oF) ) for Ain Guilloume water spring in comparison to Ain Messai water spring HT=7 French degrees (oF). Those data conduct us to select the drinking water source of Ain Guilloume due to its attractive composition and value.

                                                 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Surgical –Audit on breast cancer risk factors in AL-Russafa district in Baghdad
...Show More Authors

Background: Breast cancer remains a substantial cause of morbidity and mortality, there is a need for continued efforts to understand the etiology of the disease, maintain screening effort, implement prevention strategies, and develop better treatments.Objective: To analyze the risk factors, improve early detection and prevention of breast cancer in Al-Russafa district- Baghdad, aiming to increase survival rate and improve the quality of life.Methods: A cross sectional audit of 258 breast cancer cases seen at Al-Elwiya maternity teaching hospital from January2009 to December 2011,data collected from patients files were: age, gender , residency, marital status, parity, age at menarche and menopause age at first live birth, hormonal therap

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
African Journal Of Biomedical Research
Yogurt Acid Whey Effect on Enamel Resistance to Phosphorus Dissolution Against Acid Challenge
...Show More Authors

View Publication
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST OBSERVATIONS ON PHRYNOCEPHALUS MACULATUS LONGICAUDATUS HAAS, 1957 (SQUAMATA: SAURIA: AGAMIDAE) IN IRAQ
...Show More Authors

    The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Scholars’ confrontation on atheistic thought in modern Turkey Saeed Nursi is an example
...Show More Authors

The Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of ​​land they ruled.  In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.

 

After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Advanced Research
UV Photovoltaic detector based on Bi doped TiO2 Fabricated by Pulse Laser Deposition
...Show More Authors

Pure and doped TiO 2 with Bi films are obtained by pulse laser deposition technique at RT under vacume 10-3 mbar, and the influence of Bi content on the photocvoltaic properties of TiO 2 hetrojunctions is studied. All the films display photovoltaic in the near visible region. A broad double peaks are observed around λ= 300nm for pure TiO 2 at RT in the spectral response of the photocurrent, which corresponds approximately to the absorption edge and this peak shift to higher wavelength (600 nm) when Bi content increase by 7% then decrease by 9%. The result is confirmed with the decreasing of the energy gap in optical properties. Also, the increasing is due to an increase in the amount of Bi content, and shifted to 400nm when annealed at 523

... Show More
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref