Prosthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe present study include a new developed method of analysis for determination of drug Spironolaction (SP) in some Pharmaceuticals by Spectrofluorometric method. Spironolaction was determined under optimal experimental condition that follows :- The excitation spectrum was (l=351 nm), the emmetion spectrum was (l=518 nm), pH=1, the suitable temperature for reaction 60oC and the optimal time less than (3) minute. The analysis and rang statistical data was:-Linear dynamic rang (1-10) ?g.ml-1, the detection limit (D.L = 0.023 ?g.ml-1), Molar absorptivity (? = 29875 liter mole-1 cm-1), Relative standard deviation (%RSD = 0.78), (%Erel = 3.3) and recovery (Rec = 96.6) percentage. Determination of Spironolactone was accomplished by two methods
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
Green synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show More