Preferred Language
Articles
/
whejppIBVTCNdQwCYbwH
Zwitterionic ion chromatography coupled with ultraviolet detection for the quantification of 2-deoxyguanosine in human serum
...Show More Authors

Scopus
Publication Date
Tue Jun 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of serum and salivary oxidant and total antioxidant status of patients with recurrent aphthous stomatitis in a sample of Basrah city
...Show More Authors

Background: Recurrent Aphthous Stomatitis (RAS) is the most common painful oral mucosal disease, affecting approximately 20% of the population. RAS presents with a wide spectrum of severity ranging from a minor nuisance to complete debility. Many of factors thought to have been involved in its etiology; that might have at the same time a direct or indirect impact upon oxidant/antioxidant system and trigger free radicals production. The aim of this study was to determine the possible association of oxidant/total antioxidant status and recurrent aphthous stomatitis (RAS). Subjects, materials and methods: The study consisted of thirty patients with recurrent aphthous stomatitis and thirty healthy controls from which saliva and blood samples we

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The effects of human error in the banking risks - Empirical study in a number of Iraqi private banks
...Show More Authors

Abstract

This research aims to study human error effects in the banking risks in the private banks  through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.

Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Brazilian Dental Science
Assessing the level and diagnostic accuracy of osteopontin and oral health status in periodontitis patients with/without Type-2 Diabetes Mellitus
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Brazilian Dental Science
Assessing the level and diagnostic accuracy of osteopontin and oral health status in periodontitis patients with/without Type-2 Diabetes Mellitus
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Bioactivity Evaluation for Some Metal Ions Complexes with New Ligand Derived from 2-hydroxy-1- napthaldehyed
...Show More Authors

The newly synthesized Schiff base ligand (E)-2-((2-phenylhydrazono)methyl)naphthalen-1-ol (phenyl hydrazine derivative), is allowed to react with each of the next mineral ion: Ni2+, Cu2+, Zn2+andCd2+successfully resulting to obtain new metal complexes with different geometric shape. The formation of Schiff base complexes and also the origin Schiff base is indicated using LC-Mass that manifest the obtained molar mass, FT-IR proved the occurrence of coordination through N of azobenzene and O of OH by observing the shifting in azomethines band and appearing of M-N and N-O bands. Moreover, we can also detect by such apparatus, the presence of aquatic water molecule inside the coordination sphere. UV-Vis spectra of all resultants reveale

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (57)
Crossref (57)
Scopus Clarivate Crossref