Preferred Language
Articles
/
joe-2089
System Identification Algorithm for Systems with Interval Coefficients
...Show More Authors

In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Identification of Acinetobacter baumannii and Determination of MDR and XDR Strains
...Show More Authors

The current study focuses on the bacterium Acinetobacter baumannii due to its importance as a nosocomial infections source in addition to its increased resistance against antibiotics. Different clinical and hospital environment samples were collected, and cultured on A. baumannii selective media: Leed Acinetobacter agar and Herellea agar. A. baumannii have been identified by traditional methods, followed by confirmation using molecular identification to detect blaoxa-51 like gene which is considered a diagnostic gene since it is present in genome of all A. baumannii strains. The result was, nineteen bacterial isolates of A.baumannii were obtained, from twenty-seven suspected isolate

... Show More
View Publication Preview PDF
Scopus (11)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
mmunohistochemical Identification And Quantification Of Brown Adipocytes In Human Adipose Tissue.
...Show More Authors

Background: Obesity is a worldwide challenge and is closely
connected to many metabolic diseases. Two types of
adipose tissue, white adipose tissue (WAT) and brown
adipose tissue (BAT) have been identified. White fat cells
store chemical energy, brown adipocytes defend against
hypothermia, obesity and diabetes.
Objective: To localize and quantify brown adipocytes in
human subcutaneous (S) and visceral (V) adipose tissue by
histology and immunohistochemistry.
Type of the study: A cross –sectional study.
Methods: Adipose tissue was obtained from histopathology
specimens taken from ten patients, of different age, sex and
body mass index (BMI), undergoing surgery for different
pathologies

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Applied Mathematics And Computation
Identification of the time-dependent conductivity of an inhomogeneous diffusive material
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 21 2023
Journal Name
Eastern Journal Of Agricultural And Biological Sciences
Isolation and molecular identification of Pathogenic cryptococcus gattii from natural habitat
...Show More Authors

This study is designed to isolate and molecular identification of C. gattii, C. gattii is pathogenic yeast and effect immunocomposed and immunocompetent, Methods: collect 50 samples from eucalyptus leaves. The collection time was extended from November 2021 to February 2022 and then culture at SDA, Cryptococcus Differential Agar esculin agar and Eucalyptus leaves agar, Brain heart infusion agar with methyldopa and Brain heart infusion agar with methyldopa media, biochemical test including urease test, and then confirm identification by molecular identification by PCR technique sequencing and genetic analysis. The results showed that 4 swaps taken from eucalyptus leaves included cryptococcus neoformans. This study indicated that the virulenc

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering
SENTIMENT RETRIEVAL OF HEALTH RECORDS USING NLP-BASED ALGORITHM
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF