Preferred Language
Articles
/
whejppIBVTCNdQwCYbwH
Zwitterionic ion chromatography coupled with ultraviolet detection for the quantification of 2-deoxyguanosine in human serum
...Show More Authors

Scopus
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of New Chelating Terpolymer Resin Derived from p-Amino Benzoic Acid, Biuret and Formaldehyde and Study Efficiency Extractive from Some Metal Ion
...Show More Authors

  In this study terpolymer resin  ) p-ABBF) was prepared by condensation of (p-amino benzoic acid) and (Biuret) with formaldehyde in (1:1:3) mol ratio using hydrolic acid as a reaction medium at 130±2 ℃ .The synthesized terpolymer resin was characterized by elemental analysis , FT-IR and (1H-NMR) spectroscopy. The intrinsic viscosity was determined. The thermal stability of the terpolymer was analyzed by (TGA and DSC).The morphological feature of the (p-ABBF) terpolymer resin was studied by scanning electron microscopy (SEM).Bach equilibrium method was employed to study analytical efficiency of the terpolymer resin towards certain trivalent and divalent metal ions such as (Cu+2,Ni+2, Co+2,Zn+2,Cd+2 and Cr+3( where thes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The effectiveness of the Iraqi banking system in dealing with the effects of fiscal austerity policy
...Show More Authors

Abstract:

    Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Phenotypic and molecular detection of Escherichia coli efflux pumps from UTI patients
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil
...Show More Authors

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun May 11 2014
Journal Name
World Journal Of Experimental Biosciences
Detection of hydrolytic enzymes produced by Azospirillum brasiliense isolated from root soil
...Show More Authors

Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Detection and interpretation of clouds types using visible and infrared satellite images
...Show More Authors

One of the most Interesting natural phenomena is clouds that have a very strong effect on the climate, weather and the earth's energy balance. Also clouds consider the key regulator for the average temperature of the plant. In this research monitoring and studying the cloud cover to know the clouds types and whether they are rainy or not rainy using visible and infrared satellite images. In order to interpret and know the types of the clouds visually without using any techniques, by comparing between the brightness and the shape of clouds in the same area for both the visible and infrared satellite images, where the differences in the contrasts of visible image are the albedo differences, while in the infrared images is the temperature d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 30 2021
Journal Name
Iraqi Journal Of Science
Molecular detection and identification of Enterococcus faecium isolated from dental root canals
...Show More Authors

Enterococci are usually encountered and predominate in oral infections, especially those associated with dental root canal infections of necrotic pulp and periodontitis. This study aimed to detect and identify Enterococcus faecium isolated from infected root canals, using polymerase chain reaction ( PCR). Thirty samples were collected from patients with  necrotic pulp, infected root canals, and endodontic treatment failure, attending the Conservative Treatment Department, College of Dentistry, Mosul University, Dental Teaching Hospital. The samples were obtained by inserting sterile paper points into the root canals and transferred in brain heart infusion broth vials to be  inoculated in a selective M-Enterococcus Agar Base . T

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Apr 19 2010
Journal Name
Computer And Information Science
Quantitative Detection of Left Ventricular Wall Motion Abnormality by Two-Dimensional Echocardiography
...Show More Authors

Echocardiography is a widely used imaging technique to examine various cardiac functions, especially to detect the left ventricular wall motion abnormality. Unfortunately the quality of echocardiograph images and complexities of underlying motion captured, makes it difficult for an in-experienced physicians/ radiologist to describe the motion abnormalities in a crisp way, leading to possible errors in diagnosis. In this study, we present a method to analyze left ventricular wall motion, by using optical flow to estimate velocities of the left ventricular wall segments and find relation between these segments motion. The proposed method will be able to present real clinical help to verify the left ventricular wall motion diagnosis.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref