Preferred Language
Articles
/
Gha1oooBVTCNdQwCD6L3
Detection of lukf-pv gene in Staphylococcus aureus isolated from pregnant women with Urinary tract infection
...Show More Authors

Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Shared Congestion Detection: A Comparative Study
...Show More Authors

Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Apr 01 2025
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Serological and Molecular Detection of Prevalence of Human Parvovirus (B19) in Beta Thalassemia Major Patients in Baghdad
...Show More Authors

Background: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV).  For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Sorption of Nitrate Salts from Wastewater without and with Modification Orange Peel
...Show More Authors

This investigation deals with the use of orange peel (OP) waste as adsorbent for removal of nitrate (NO3) from simulated wastewater. Orange peel prepared in two conditions dried at 60C° (OPD) and burning at 500 °C (OPB). The effect of pH: 2-10, contact time: 30- 180 min, sorbent weight: 0.5- 3.0 g were considered. The optimal pH value for NO3 adsorption was found to be 2.0 for both adsorbents. The equilibrium data were analyzed using Langmuir and  Freundlich isotherm models. Freundlich model was found to fit the equilibrium data very well with high-correlation coefficient (R2). The adsorption kinetics was found to follow pseudo-second-order rate kinetic model, with a good correlation (R2

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2025
Journal Name
Research J. Pharm. And Tech
Fortification of Meat Burger with Protein Isolate Extracted from Local Pumpkin Seeds
...Show More Authors

ABSTRACT: Protein isolate was achieved from local peeled non soaked pumpkins seeds by using petroleum ether with protein percentage of 53.15%. Protein isolate was used in manufacturing meat burger with two substitution10 and 20%. The shrinkage percentage for burger diameter was decreased from 25.5 to 16.6%, the sample with 10% substitution was distinguished in water holding capacity (WHC) which was 54.52%. Sensitive evaluation for these samples showed that the burger with 10% substitution was similar to the control.

Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Phenol from Water and Wastewater by Chemical Precipitation with Lime
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
COVID-19Disease Diagnosis using Artificial Intelligence based on Gene Expression: A Review
...Show More Authors

Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Media Coverage of Yazidi Women in the Iraqi Press Analytical Study in Al-Mada Newspaper: غادة حسين العاملي
...Show More Authors

This research reveals the treatment mechanisms followed in the media for covering the topic of displacement and captivity of Yazidi in the Iraqi press, through studying all the publishing in one of the Iraqi newspapers concerning the research subject. The research problem is in the following questions:

  • What are the journalistic arts that are tackled by the newspaper concerning the subject of the Yazidi women?
  • What are the editing forms for the model of the press subjects that have been employed about the event and what are its sources?
  • What are the highlighting means used in presenting the subjects within the journalistic arts?
  • What are the i

... Show More
View Publication Preview PDF
Crossref