Preferred Language
Articles
/
khcqnpIBVTCNdQwCxrqH
Preparation, characterization and preliminary cytotoxic evaluation of 6-mercaptopurine-coated biotinylated carbon dots nanoparticles as a drug delivery system
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Numerical investigation for Natural Convection in a square Enclosure with partially active thermal sides' wall
...Show More Authors

Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.

Scopus
Publication Date
Fri Nov 03 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Professional Challenges Facing Pharmacists Working at Public Hospitals in an Iraqi Province: A Qualitative Study
...Show More Authors

In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cadmium Removal Using Bio-Electrochemical Reactor with Packed Bed Rotating Cylindrical Cathode: A Kinetics Study
...Show More Authors

   The kinetics of removing cadmium from aqueous solutions was studied using a bio-electrochemical reactor with a packed bed rotating cylindrical cathode. The effect of applied voltage, initial concentration of cadmium, cathode rotation speed, and pH on the reaction rate constant (k) was studied. The results showed that the cathodic deposition occurred under the control of mass transfer for all applied voltage values ​​used in this research. Accordingly, the relationship between logarithmic concentration gradient with time can be represented by a first-order kinetic rate equation. It was found that the rate constant (k) depends on the applied voltage, the initial cadmium concentration, the pH and the rotational speed of cathode. It

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Applied Soft Computing
A new evolutionary algorithm with locally assisted heuristic for complex detection in protein interaction networks
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath: Fatin Kaleel Ismael
...Show More Authors

A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath

View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Factors associated with facial swelling severity following impacted lower third molar surgery: A prospective study
...Show More Authors

Background: The ultimate purpose of this prospective study is to estimate and measure swelling associated with surgical extrac¬tion of impacted mandibular third molars in different four post-operative times and to identify the risk factors associated with determination of their risk degree. Material and Methods: In this prospective cohort study 159 consecutive cases in which removal of impacted lower third molars in 107outpatients were evaluated. Five groups of variables have been studied which are regarded as a potential factor for swelling after mandibular third removal which will enable the surgeon to predict and counsel high risk patients in order to offer a preventive strategy. Results: Facial measurements were carried out on 1st, 2

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What Bukhari shortened to a bug in its attribution: (Applied study in the correct mosque)
...Show More Authors

This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.

View Publication Preview PDF