Preferred Language
Articles
/
6hYO6IoBVTCNdQwCSacO
Methods for simultaneous detection of the cyanotoxins BMAA, DABA, and anatoxin-a in environmental samples
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 30 2021
Journal Name
Al-kindy College Medical Journal
Practice and Opinion of Doctors in Primary Health Care Centers Toward Referral System: Samples from Nine Governorates in Iraq
...Show More Authors

Background: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.

Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.

Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Measurement of uranium concentration in the water samples collected from the areas surrounding in Al-Tuwaitha nuclear site using the CR-39 detector
...Show More Authors

Abstract. In this research, the uranium concentration in (16) water samples collected from some agricultural areas surrounded with AlTuwitha nuclear site in Baghdad-Iraq was measured by using a CR-39 detector. The concentration of uranium in this study was from (0.6 ± 0.33mg/l) to (2.51 ± 0.49 mg/l), and the weighted average for the concentrations (1.262 ± 0.402 mg/l). The results showed it is a concentration of uranium level in water samples studied is higher than the allowed limit recommended by WHO and ICRP.

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of tax exemption in reducing environmental pollution: An applied study on brick factories in Iraq
...Show More Authors

Air pollution is considered one of the major environmental problems that contain many challenges and difficulties facing most countries of the world, including Iraq. The problem has emerged widely with the emergence of the industrial revolution in the world and the tremendous increase in the population and the increase in the number of transportation and its development in addition to excavation, maintenance and work Construction and weather fluctuations, such as dust and sandstorms, pollution resulting from oil refining, extraction, diversion and other processes that cause pollution, and the start of the world using methods that limit the volume of environmental pollution. The most prominent of these methods is the imposition of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Comparison of some reliability estimation methods for Laplace distribution using simulations
...Show More Authors

In this paper, we derived an estimator of reliability function for Laplace distribution with two parameters using Bayes method with square error loss function, Jeffery’s formula and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived Bayesian estimator compared to the maximum likelihood of this function and moment method using simulation technique by Monte Carlo method under different Laplace distribution parameters and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator and moment estimator in all samples sizes

Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Iterative Methods for Approximation of Fixed Points Via Like Contraction Mappings
...Show More Authors
Abstract<p>The aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.</p>
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 29 2025
Journal Name
Jurnal Hama Dan Penyakit Tumbuhan Tropika
Detection and biocontrol of Tobamovirus tabaci infecting tomato in Iraq
...Show More Authors

The antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Detection of Polyomavirus BK and JC in kidney Transplant Recipients
...Show More Authors

objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 27 2023
Journal Name
Icst Transactions On Scalable Information Systems
Tools and Process of Defect Detection in Automated Manufacturing Systems
...Show More Authors

INTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound sy

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref