Preferred Language
Articles
/
BhbDuYsBVTCNdQwCONiJ
PARATHYROID GLAND, ANATOM, HISTOLOGY, AND PHYSIOLOGY (A SHORT REVIEW)
...Show More Authors

Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Well placement optimization: A review
...Show More Authors

Optimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati

... Show More
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Biochem Cell Arch
Histological and Histochemical Observations of the Vesicular Gland in Adult Indigenous Bull, Bos Indicus
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Basrah Journal Of Veterinary Research
Some macroscopic and microscopic observation on the pituitary gland of guinea-pig Cavia culteri.
...Show More Authors

View Publication
Publication Date
Thu Oct 06 2016
Journal Name
Ibn Al-haitham J. For Pure & Appl. Sci.
Anatomical and Histological Study of Thyroid Gland in Weasel (Herpestes javanicus) (E.Geoffroy saint.Hilaire,1818)
...Show More Authors

Abstract The present study aimed to investigate the morphological description and histological structure of thyroid gland in Herpestes javanicus . The results revealed that thyroid gland in adult Herpestes javanicus is located in the neck region just below the larynx and attached to the trachea . Histological study revealed that thyroid gland in H. javanicus surrounded by a capsule of losse connective tissue and the thyroid gland mainly formed from follicles within different sizes. The results showed that the follicle consists of three compenets represented by follicular lining cells, basal parafollicular cells and the colloid. Microscopical examination revealed that the follicular lining tissue is either to be simple squamous or simple cub

... Show More
Publication Date
Wed May 01 2024
Journal Name
Journal Of Madenat Alelem College
Study 1,4- Naphthoquinone Derivative and Biological Activity: A Review
...Show More Authors

In this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.

Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Negative skin friction evaluation and mitigation: A review study
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (64)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (12)
Crossref (13)
Scopus Crossref