Preferred Language
Articles
/
mxbrJIcBVTCNdQwCrzq-
Derivation of a New Equation to Obtain the Permeability Coefficient of Clayey Soils
...Show More Authors

The main objective of this research is to find the coefficient of permeability (k) of the soil and especially clayey soil by finding the degree of consolidation (rate of consolidation). New modify procedure is proposed by using the odometer (consolidation) device. The ordinary conventional permeability test usually takes a long time by preparing and by testing and this could cause some problems especially if there is a need to do a large number of this test and there were a limited number of technicians and/or apparatus. From this point of view the importance of this research is clear, since the modified procedure will require a time of 25 minute only. Derivation made to produce an equation which could be used to fined the permeability if the proposed procedure fallowed to find the permeability of soils and this done by specification the degree of consolidation at any loading stage. The results of permeability found by the proposed procedure and by ordinary test (directly by falling head method, and indirectly by accelerated consolidation method using the oedometer device). After that these results were found by proposed procedure compared with that results which found by ordinary test. it has been found that this equation give a very good results with (95.83) % accuracy and degree of correlation of (0.9988) comparing with ordinary methods and beside that it takes a very short time.

Crossref
View Publication
Publication Date
Wed Oct 02 2024
Journal Name
Translation&linguistics
Verbal forms in French and Iraqi Arabic: a contrastive study
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Congenital Thrombasthenia In Children Welfare Teaching Hospital: A Descriptive Study
...Show More Authors

Background: Thrombasthenia is an inherited genetic disorder affecting platelets, which is characterized by spontaneous muco-cutaneous bleeding and abnormally prolonged bleeding in response to injury or trauma. Objectives: The aim of this study was to assess the diagnosis and treatment of thrombasthenia in Children Welfare Teaching Hospital. Type of the study: A cross-sectional study. Methods: This descriptive study was performed on 66 patients with thrombasthenia from the first of October 2013 till the first of July 2015.The diagnosis of the disease was done by a wide spectrum of characteristics including family history, clinical manifestations, laboratory tests.. Results: The common manifestations of the disease at time of diagnosis wer

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 14 2020
Journal Name
Progress In Industrial Ecology, An International Journal
3D image reconstruction from its 2D projection - a simulation study
...Show More Authors

A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 08 2018
Journal Name
Journal Of Dental Research
Self-Limiting versus Conventional Caries Removal: A Randomized Clinical Trial
...Show More Authors

A single-blind randomized controlled clinical trial in patients with deep caries and symptoms of reversible pulpitis compared outcomes from a self-limiting excavation protocol using chemomechanical Carisolv gel/operating microscope (self-limiting) versus selective removal to leathery dentin using rotary burs (control). This was followed by pulp protection with mineral trioxide aggregate (MTA) and restoration with glass ionomer cement and resin composite, all in a single visit. The pulp sensibility and periapical health of teeth were assessed after 12 mo, in addition to the differences in bacterial tissue concentration postexcavation. Apical radiolucencies were assessed using cone beam computed tomography/periapical radiographs (CBC

... Show More
View Publication
Scopus (37)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Asian Journal Of Pharmacy And Pharmacology
Genetic polymorphisms associated with diabetic foot ulcer: A review article
...Show More Authors

Diabetic foot ulcer (DFU) or Lower limb ulcers are one of the major complications caused by diabetes mellitus especially when patients fail to maintain tight glycemic control. DFU is linked to multiple risk factors along with the genetic factors and ethnicity which play a significant role in the development of DFUs through their effects on multiple aspects of the pathophysiological process. This narrative review aimed to summarize all the previous studies within the last ten years associating gene polymorphism and DFU. Polymorphism associated with vascular endothelial growth factor (rs699947), the G894T polymorphism of the endothelial nitric oxide synthase gene, interleukin-6–174 G>C gene polymorphism, heat shock protein 70 gene polymorph

... Show More
Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Robust Adaptive Sliding Mode Controller for a Nonholonomic Mobile Platform
...Show More Authors

In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking.  The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Rawal Medical Journal
Procalcitonin Level In COVID-19 Patients: A single center study
...Show More Authors

Objective: The study the association of procalcitonin (PCT) and c-reactive protein (CRP) levels in COVID-19 patients and it's role as a guide in progress and management of those patients. Methodology: This cross-sectional study analyzed 200 CIOVID-19 patients in a single privet center in Baghdad, Iraq from January 1, 2021 to January 1, 2022. Demographic data like age, sex, and clinical symptoms were recorded. High sensitivity CRP and PCT in the serum were measured via dry fluorescence immunoassay (Lansionbio-China). Results: Out of 200 patients, 50 had moderate Covid and 150 had severe disease. Mean serum PCT levels was 0.039±0.05 ng/mL in the moderate group (range 0.011-0.067) and 0.43±0.21 ng/mL in the severe group (range 0.21

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More