Preferred Language
Articles
/
xBcqFJQBVTCNdQwCbP5r
Comprehensive review of severe slugging phenomena and innovative mitigation techniques in oil and gas systems
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 07 2023
Journal Name
Journal Of Obstetrics, Gynecology And Cancer Research
Evaluation of Maternal and Fetal Complications in Pregnant Women with Polycystic Ovary Syndrome (PCOS) with Severe and Mild Phenotype
...Show More Authors

An essential issue in obstetrics is the prevalence of maternal and fetal complications in pregnant women with polycystic ovary syndrome (PCOS). The purpose of the present study was to investigate the prevalence of pregnancy complications among various phenotypes of pregnant women with PCOS.

View Publication
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Day to Day variation of Ionosphere Electron and Ion Temperature during Great and Severe Geomagnetic Storms
...Show More Authors

The ionospheric characteristics exhibit significant variations with the solar cycle, geomagnetic conditions, seasons, latitudes and even local time. Representation of this research focused on global distribution of electron (Te) and ion temperatures (Ti) during great and severe geomagnetic storms (GMS), their daily and seasonally variation for years (2001-2013), variations of electron and ion temperature during GMS with plasma velocity and geographic latitudes. Finally comparison between observed and predicted Te and Ti get from IRI model during the two kinds of storm selected. Data from satellite Defense Meteorological Satellite Program (DMSP) 850 km altitude are taken for Te, Ti and plasma velocity for different latitudes during great

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Innovative Thinking and its Representations in Interior Space Design: علاء الدين كاظم منصور الإمام
...Show More Authors

        The current research studies the innovative thinking system in the field of the interior design, and the extent of the possibility of activating its work mechanisms as a strategy for the redesigning principle according the variables of the contemporary social thinking. The research aims at revealing the nature of the thinking criteria and requirements that provide strategic values that guide the interior designer and the architect to organize the mechanism the act of designing. It also contributes in dealing with the design product through activating its ability in innovation and redesigning.

       The research consists of the concept of innovation, the&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of green accounting information systems in the oil sector and its impact on reporting on sustainability - an applied study
...Show More Authors

Abstract

                  The research seeks to shed light on green accounting information systems, analyze them, identify sustainability reporting and how to improve it, as well as study the importance of the Iraqi oil sector, analyze it, and work on applying green accounting information systems in order to improve the quality of sustainability reporting. Oil as a branch of the General Corporation for the Distribution of Oil and Gas Products to apply the practical aspect and prove the hypothesis of the research. Explaining the company's role in improving environmental conditions

View Publication Preview PDF
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of Engineering
Effective quality control of a municipal wastewater treatment plant using Geographic information systems: A Review
...Show More Authors

Inefficient wastewater disposal and wastewater discharge problems in water bodies have led to increasing pollution in water bodies.  Pollutants in the river contribute to increasing the biological oxygen demand (BOD), total suspended solids (SS), total dissolved solids (TDS), chemical oxygen demand (COD), and toxic metals render this water unsuitable for consumption and even pose a significant risk to human health. Over the last few years, water conservation has been the subject of growing awareness and concern throughout the world, so this research focused on review studies of researches that studied the importance of water quality of wastewater treated disposal in water bodies and modern technology to management w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Extraction of Fish Oils and Used in Drugs Systems.: Extraction of Fish Oils and Used in Drugs Systems.
...Show More Authors

In this study was undertaken frish fish such as Bigeye Ilisha megaloptera, Nematalos nasus, Suboor Hilsha ilisha and Carp Cyprinus carpio. they were purchased from local marketes in Basrah, Oil was extracted by a solvent extraction method on low temperature. And the level of oil obtiened about (6.08; 10.72; 13.52 and 5.61)% for Bigeye, Jaffout, Suboor and Carp. the Crud oils were compared with vegetable oil (olive oil) and animal fat (tial fat mutton).
The extracted oil from fresh complete fishs with compared oils intraed on pharmacological system through packed in capsul with and with out garlic`s extract. this system analysis with chemical tests.
Results were analyzed statistically by using the SPSS program with using (CRD)

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jan 18 2017
Journal Name
International Journal Of Pharmacy Practice
Antimicrobial utilization in an Iraqi province: a comprehensive evaluation of antibiotic source and cost
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Crossref