Preferred Language
Articles
/
qxfEQo8BVTCNdQwCn2eS
Cytotoxic Potential of Neem (Azadirachta indica A. Juss) Oil
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Serum Lipoprotein (A) in Patients with Fibromyalgia Syndrome
...Show More Authors

Background: Fibromyalgia syndrome (FMS) is the
most common rheumatic cause of diffuse pain and
multiple regional musculoskeletal pain and disability.
Objective: is to assess the contribution of serum
lipoprotein (A) in the pathogenesis of FMS patients.
Methods: One hundred twenty two FMS patients
were compared with 60 healthy control individuals
who were age and sex matched. All FMS features and
criteria are applied for patients and controls; patients
with secondary FMS were excluded. Serum
Lipoprotein (A): [Lp(A)], body mass index (BMI), &
s.lipid profile were determined for both groups.
Results: There was a statistical significant difference
between patients &controls in serum lipoprotein

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Samarra Journal Of Pure And Applied Science
Preclinical Oral Histology Research: A Retrospective Review Study
...Show More Authors

A retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco

... Show More
Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
2017 47th European Microwave Conference (eumc)
A semiconductor based millimeter-wave waveguide junction circulator
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
A Review in Sustainable Plastic Waste in Concrete
...Show More Authors

Recently times, industrial development has increased, including plastic industries, and since plastic has a very long analytical life, it will cause environmental pollution. Therefore studies have resorted to reusing recycled plastic waste (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, some studies were reviewed and then summarized into several things, including the percentage of plastic replacement from the aggregate and the effect of this percentage on the fresh properties of concrete, such as the workability and the effect of plastic waste on the hardening properties of concrete such as dry density, compressive, tensile and flexural strength.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 17 2023
Journal Name
Wireless Communications And Mobile Computing
A Double Clustering Approach for Color Image Segmentation
...Show More Authors

One of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref