Preferred Language
Articles
/
tRdQPo4BVTCNdQwCrD6b
Data Analytics and Blockchain: A Review
...Show More Authors

Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review. Index Terms— Blockchain, Distributed Database, Distributed Consensus, Data Analytics, Public Ledger.

Crossref
View Publication
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Effect of vincristine and vinblastine on mice spermatozoa in vitro
...Show More Authors

The aim of this project was to study the in vitro effect of antineoplastic drugs (vincristine and vinblastine) on mice spermatozoa. Eighteen adult (age 8-9 weeks) male mice were divided into three groups equally. The animals in each group were slain by cervical dislocation, the testes were removed and two tails of epididymides isolated. Spermatozoa were obtained from the two tails of epididymides by mincing in 500 µl TCM-199.The first group non-treated (unadded) as a control group, second group added 10 µg/ml of vincristine to TCM-199 and the third group added 10 µg/ml of vinblastine to TCM-199. After 10 minutes from added of vincristine and vinblastin measured the following test: spermatozoa activity, percentage dead spermatozoa and mor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Neuroquantology
Thermal and Mechanical Behaviour of Heat-resistant Clay-silica Composites
...Show More Authors

The ceramic composite with different proportions of clay and silica was prepared with a grain size of 70 μm and the weight percentage was selected for four groups (clayx silica100-x) were x q15, 25, 30 and 50. In this manuscript, for each pressured sample, a sintering procedure was carried out for 3 hours under static air and at various sintering temperatures (1000, 1100, 1200, 1400)°C. After sintering, the density, porosity, water absorption, compression strength and thermal conductivity were measured. The best results were obtained using a mixture of 15% clay and 85% silica which were sintering at 1400°C for three hours under air.

View Publication
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Watermarking using Integer Wavelet Transform and Discrete Cosine Transform
...Show More Authors

In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.

View Publication Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Compatibility between Hydraulic and Mechanical Properties of Ceramic Water Filters
...Show More Authors

In this paper, ceramic water filters were produced by using ten mixtures of different ratios of red clay and sawdust under different production conditions. The physical properties of these filters were tested. The production conditions include five press pressures ranged from 10 to 50MPa and a firing schedule having three different final temperatures of 1000, 1070, and 1100˚C. The tests results of the physical properties were used to obtain best compatibility between the hydraulic and the mechanical properties of these filters. Results showed that as the press pressure and the firing temperature are increased, the bulk density and the compressive and bending strengths of the produced filters are increased, while, the porosity and absorp

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
The relationship between Hypertension and weight status in Iraqi population
...Show More Authors

Most medical books and researches documented that increased body weight is a predisposing factor to hypertension , and there is recent work in this field as well. In this research , the relationships between hypertension and body weight with age were studied in Iraqi population . It is concluded that diastolic hypertension is separated from systolic and combined hypertension and increased body weight has little effect on increased blood pressure.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Incidence, Risk Factors and Diagnosis of Ventilator Associated Penumonia.
...Show More Authors

Background: The critically ill patient is at risk of developing intensive care acquired infection, with the lungs being especially vulnerable. Ventilator associated pneumonia (VAP) occurring after two days of mechanical ventilation and it is the most nosocomial infection seen in the intensive care unit .The establishment of an accurate diagnosis of ventilator associated pneumonia remains problematic and yet there is still no accepted "gold standard" for the diagnosis.
Patients& Methods: This is a cross section study for 328 patients admitted to intensive care unit at medical city teaching hospital. Full history, physical examination and investigation were done after 48 hours of admission according to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation between CMV Infection and Hypertension in Iraqi Patients
...Show More Authors

In order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Epidemiological and clinical study of leishmaniasis in Kirkuk city, Iraq
...Show More Authors

leishmaniasis is a disease of global concern, Leishmania types and  distribution rates vary from country to another. For visceral leishmaniasis serum samples were examined by the kala-azar dipstick rapid test. Meanwhile smears were taken from lesions, air dried, fixed and Leishman stained then microscopically examined for amstigote stage in cutaneous leishmaniasis. From April 2014 to April 2015, 150 samples for cutaneous leishmaniasis (CL) and 108 serum sample for visceral leishmaniasis (VL) from in and out patients in Pediatric, Azadi Teaching and Kirkuk General Hospitals were examined. The incidence of visceral leishmaniasis was very low (2.7%) comparing to that in cutaneous leishmaniasis (64.6%). No significant differenc

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Antibacterial and Phytochemical Study of Iraqi Salvia officinalis Leave Extracts
...Show More Authors

Sage (Salvia officinalis), belong to Labiatae family is indigenous to Iraq and other Mediterranean areas but now cultivated world- wide, principally for its use as culinary herb. In the present study preliminary screening for the important phytochemical natural product groups indicated the presence of flavonoid, saponin, hyrolysable and condensed tannin groups. The antibacterial  activity of two concentrations 10 mg/ml and 100 mg/ml of chloroform and hydroalcoholic extracts from  Salvia officinalis leaves was evaluated against four strains of gram negative bacteria (Escherichia coli,  Pseudomonas arigenossa,  Klebsiella pneumonia, and  Proteus spp) and two str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref