Preferred Language
Articles
/
oxehLZIBVTCNdQwCPac2
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Classification of anemia in hemodialysis patients in relation to vascular access and its correlation with hepcidin and ferritin
...Show More Authors

Background: Anemia is very common in patients with chronic kidney disease, and becoming almost universal in end stage renal disease, where dialysis or renal transplantation becoming the treatment of choice. High levels of hepcidin appear to accompany reduced renal function and serum ferritin may also be elevated.
Objectives: To classify anemia in hemodialysis patients and to display the correlations between the types of anemia and inflammatory parameters like hepcidin and ferritin according to vascular access of hemodialysis.
Patients and methods: This case-control study was conducted at Al-Hayat center for hemodialysis, and included 60 adult patients on hemodialysis. Also 20 healthy individuals were recruited as control group. Mea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 15 2020
Journal Name
Pharmacy Practice
Barriers to healthcare access for Arabic-speaking population in an English-speaking country
...Show More Authors

Objective: To identify barriers to healthcare access, to assess the health literacy levels of the foreign-born Arabic speaking population in Iowa, USA and to measure their prevalence of seeking preventive healthcare services. Methods: A cross-sectional study of native Arabic speaking adults involved a focus group and an anonymous paper-based survey. The focus group and the Andersen Model were used to develop the survey questionnaire. The survey participants were customers at Arabic grocery stores, worshippers at the city mosque and patients at free University Clinic. Chi-square test was used to measure the relationship between the characteristics of survey participants and preventive healthcare services. Thematic analysis was

... Show More
View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Comparison between the BEKK and DVECH Models of Multivariate GARCH Models with Practical Application
...Show More Authors

The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 18 2018
Journal Name
European Journal Of Organic Chemistry
PdII-Mediated Oxidative Amination for Access to a 9-Azabicyclo[4.2.1]nonane Compound Library and Anatoxin-a
...Show More Authors

View Publication Preview PDF
Crossref (3)
Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Enhance Similarity Measure of Ontologys' Concepts
...Show More Authors

The field of identification of similarity was considered a subject of research strongly recommended in the areas of semantic web, artificial intelligence and linguistic literature. In this paper a new similarity measure is proposed based on the Wu and Palmer measure. This measure is applied on the domain of the pedagogical ontology. Results obtained showed that the new measure gives better relevance of the similarity values compared to the approach of Wu and Palmer and it appears that the proposed measure is advantageous because obtained results showed that it is faster and capable of obtaining results to concepts not located in the same path.

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Adapting the rhetorical concepts architecturally Excerption and inclusion as example
...Show More Authors

Excerption and inclusion are two terms in Arabic rhetoric. The excerption is defined as a taking a part of text from Holly Quran or Hadith and put it in a poem, verse line, or put it in a prose text. But the linguistics expand the concept of this term to include taking from another sciences and knowledge, like Grammar, Philology, and Prosody.
Inclusion is defined as taking a verse line or part of verse line from another poet to put it in a new poem, it is necessary that the poet who take the text should declare it, and if he hides it, it will be plagiarism.
This search is use these two terms in architecture, we have now new two terms in architecture, first one; architectural excerption, it means the designer takes a part of religio

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weak Pseudo – 2 – Absorbing Submodules And Related Concepts
...Show More Authors

      Let  R  be a commutative ring  with identity  and  E  be a unitary left  R – module .We introduce  and study the concept Weak Pseudo – 2 – Absorbing submodules as  generalization of weakle – 2 – Absorbing submodules , where a proper submodule  A of  an  R – module  E is  called  Weak Pseudo – 2 – Absorbing  if   0 ≠ rsx   A   for  r, s  R , x  E , implies that  rx   A + soc ( E ) or  sx  A + soc (E)  or   rs  [ A + soc ( E ) E ]. Many basic  properties, char

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban securi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban secur

... Show More
View Publication
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref