Preferred Language
Articles
/
5xYJBYcBVTCNdQwCDC3e
A Survey of Different DC Faults in a Solar Power System
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Nov 04 2013
Journal Name
Jordan Journal Of Biological Sciences
Bacteriocin Typing of Staphylococcus aureus Isolated from Different Sources in Ibb City, Yemen
...Show More Authors

Abstract A total of 207 specimens were collected from different sources including patients, health care staff and hospital environment in Ibb city, Yemen. The study used the bacteriocin produced from active producer strains in typing of Staphylococcus aureus. Depending on the morphological, cultural and biochemical characteristics, 54 (26.09%) isolates of Staphylococcus aureus were identified. An antibiotic sensitivity test was done for the bacterial isolates, and the results showed that there were multiple resistant antibiotics. The Staphylococcin production of these isolates has been detected by using wells assay. Fifty one isolates were Staphylococcin producer. Four isolates (staph19, staph25, staph28 and staph43) were chosen as go

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Assessment of Some Hematological parameters in Iraqi Women with Different Breast Cancer Stages
...Show More Authors

Breast cancer (BC) is the most commonly diagnosed cancer in women. The metabolism of iron is closely regulated by hepcidin which exerts its action by interacting with a ferroportin.

 The aim of the present study was to assess the alterations in the levels of some serum biomarkers that have a role in iron homeostasis (hepcidin and ferroportin) in addition to hematological parameters (hemoglobin, leukocyte and platelets count) in different stages of BC.

This study included 66 women with BC. The patients were categorized as follows : group 1 includes :22 patients with stage I disease ,group 2 includes: 22 patients with stage II disease ,and group 3 include: 22 patients with stage III disease .Group 4 includes :22 appare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 15 2009
Journal Name
Journal Of Kerbala University
Viscosity and Volumetric studies of some amino acids in solutions at different temperatures
...Show More Authors

Densities ρ and viscosities η for several concentrations of amino acids (Serine, Cysteine and Threonine) at different temperatures (298.15, 303.15 and 308.15K) have been measured. On the basis of these data, the apparent molal volumes v , partial molal volumes at infinite dilution v , slope Sv , Gibbs free energy of activation for viscous flow of solution ∆G1,2 and Jones – Dole Bcoefficients were calculated the nature of solute-solvent and solute-solute interactions have been discussed in terms of the values of v , v , Sv and B-coefficents

Publication Date
Tue Aug 01 2023
Journal Name
Electric Power Systems Research
Optimal design of high voltage composite insulators with grading rings in different configurations
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and in Vitro Evaluation for Different Types of Ondansetron Hydrochloride Transdermal Patches
...Show More Authors

This research aims to develop transdermal patches of Ondansetron hydrochloride (OSH) with different types of polymers, ethyl cellulose and, polyvinyl pyrrolidone k30 in a ratio (3:0.5,3:1,3:2,2:1,1:1) with propylene glycol 20%w/w as a plasticizer. Prepared transdermal patches were evaluated for physical properties. The compatibility between the drug and excipients was studied by Differential scanning calorimetry (DSC), where there is no interaction between the drug and polymers. From the statistical study, there is a statistical difference between all the prepared formulations p<0.05. In-vitro Release study of transdermal patches was performed by using a paddle over the disc. The release profile of OSH follow

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Transylvanian Review
The role of the ABC system in determining the costs of services in Iraqi banks
...Show More Authors

The role of the ABC system in determining the costs of services in Iraqi banks

Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The status of prophecy in the Islamic faith in light of the glorious Kharida system
...Show More Authors

Knowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More