Preferred Language
Articles
/
8RYsRokBVTCNdQwCfYcV
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 04 2024
Journal Name
Analytical And Bioanalytical Chemistry Research
Optimization and Validation of a GC-FID/QuEChERS Method for Quantitative Determination of Spiromesifen Residues in Tomato Fruits, Leaves and Soil Matrices
...Show More Authors

Pesticides serve a crucial function in contemporary farming practices, safeguarding agricultural crops against pest infestations and boosting production outputs. However, indiscriminate use has caused environmental and human health damage. This study aimed to develop and validate a gas chromatography-flame ionization detection (GC-FID) methodology for the direct and routine analysis of spiromesifen residues in soil, leaves, and tomato fruits. The proposed method prioritizes simplicity by avoiding derivatization steps, offering advantages over existing approaches that utilize lengthy multi-step extraction or derivatization prior to GC analysis. A key novelty of this work is the development of a QuEChERS extraction coupled directly to GC-FID

... Show More
Scopus (2)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Identification of Candida species Isolated From Vulvovaginal Candidiasis Patients by Chromgen agar and PCR-RFLP Method
...Show More Authors

This study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 12 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Crystallization Time and Acid Type on the Synthesis of Nano-Gamma Alumina Using Double Hydrothermal Method
...Show More Authors

Double hydrothermal method was used to prepare nano gamma alumina   using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, CTAB (cetyltrimethylammonium bromide) as surfactant, and variable acids: weak acids like; citric, and acitic acids, and strong acids like; hydrochloric and nitric acids as a bridge between aluminum salts and surfactant. Different crystallization times  12, 24, 48, and 72 hrs were applied. All the batches were prepared at pH equals to 9. XRD diffraction technique was used to investigate the crystalline nano gamma alumina pure from surfactant. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the average p

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 25 2026
Journal Name
Journal Of Physical Education
The Effect of Electric Stimulation Using Proposed Apparatus on Static Balance Through Hamstring Muscle Rehabilitating in Athletes Suffering from Mild Muscle Tear
...Show More Authors

View Publication
Publication Date
Mon May 01 2023
Journal Name
Journal Of Physical Education
The Effect of Electric Stimulation Using Proposed Apparatus on Static Balance Through Hamstring Muscle Rehabilitating in Athletes Suffering from Mild Muscle Tear
...Show More Authors

KS Ismaeil, BR Jawad, Journal of Physical Education, 2023

View Publication
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Optimization of Hole Cleaning In Iraqi Directional Oil Wells
...Show More Authors

Efficient cuttings transport and hole cleaning are very important factors for obtaining an effective drilling operation. In an inclined and horizontal drilling, hole cleaning issue is a common and complex problem.

   The scope of this research is to study the drilling parameters which affect hole cleaning in Iraqi directional wells through studying and analyzing some drilled wells ( vertical , directional (30 degree) , directional (60 degree) and horizontal ).An excel sheet is prepared to calculate carrying capacity index which represents an indicator for good hole cleaning in different sections. The study indicated through the field investigations, practical experiences and theoretical calculations tha

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref