Preferred Language
Articles
/
sBZUkIsBVTCNdQwC3s39
An analytical study of some of the deterministic variables of the stage of advancement and its relation to the accuracy of the performance of the skill of high jump correction
...Show More Authors

View Publication
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Baghdad Science Journal
Water flow velocity and oxide film formation effect on copper pipe corrosion
...Show More Authors

An overall mathematical model for copper pipe corrosion in flowing water was derived based on mass transfer fundamentals where we introduced the effects of boundary layer velocity, bulk flow velocity and the surface oxide protective film on the corrosion rate. A set of experiments were conducted in a straight 10mm diameter copper pipe, flow of water include six velocities of maximum value 7.33m/sec at 200C and 350C. The good agreement between the calculated and experimental corrosion rate values were achieved , the agreement reached 92% .

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Karbala Journal Of Medicine
Open Tibial Shaft Fractures Treated By Primary External Fixation And Bone Graft
...Show More Authors

Eprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces
...Show More Authors

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Subclinical Hypothyroidism in Obese Iraqi Patients Attending Obesity Research and Therapy Unit
...Show More Authors

ABSTRACTBackground Subclinical hypothyroidism is mild thyroid hormone deficiency, defined by elevation of serum thyroid-stimulating hormone concentration despite a normal free T3, free T4 level, can be distinguished by clinical and circumstantial observations from other conditions that cause this constellation of laboratory findings. The aim is to find the prevalence, anthropologic, and metabolic changes associate subclinical hypothyroidism(SH) in adult patients presented to obesity research and therapy unit (ORTU Objective: To find the prevalence of subclinical hypothyroidism (SH) in adult obese patients presented to obesity research and therapy unit (ORTU) in AL-Kindy College of medicine and to describe the anthropologic and metabolic

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2013
Journal Name
Journal Of Physical Science And Application
Photobleaching Influence in Different Phases for Coumarin 307 and Acriflavine Laser Dyes
...Show More Authors

Abstract: Under high-excitation irradiance conditions to induce fluorescence, the dependence of photobleaching of Coumarin 307 (C307) and acriflavine (ACF) laser dyes in liquid and solid phases have been studied. A cw LD laser source of 1 mW and 407 nm wavelength was used as an exciting source. For one hour exposure time, it was found that the solid dye samples suffer photobleaching more than the liquid dye samples. This is because in liquid solutions the dye molecules can circulate during the irradiation, while the photobleaching is a serious problem when the dye is incorporated into solid matrix and cannot circulate.

Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Plos One
Hepatic Carboxylesterase 1 Is Induced by Glucose and Regulates Postprandial Glucose Levels
...Show More Authors

View Publication
Scopus (34)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More