Preferred Language
Articles
/
LRZVL4cBVTCNdQwC7Dwt
CFD Simulation of Heat Transfer Augmentation in a Circular Tube Fitted with Alternative Axis Twisted Tape in Laminar Flow under a Constant Heat Flux
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 01 2025
Journal Name
Chemical Engineering And Processing - Process Intensification
Wastewater treatment through a hybrid electrocoagulation and electro-Fenton process with a porous graphite air-diffusion cathode
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Chemical Engineering And Processing - Process Intensification
Wastewater treatment through a hybrid electrocoagulation and electro-Fenton process with a porous graphite air-diffusion cathode
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
The Relation of IGF-1 and Insulin Resistance in a Sample of Iraqi Obese Type 2 Diabetic Patients with Macrovascular Disease
...Show More Authors

Type 2 diabetes mellitus(T2DM) is a metabolic disease that is associated with an increased risk for atherosclerosis by 2-4 folds than in non- diabetics. In general population, low IGF-1 has been associated with higher prevalence of cardiovascular disease and mortality .This study aims to find out the relationship between IGF-1 level and other biochemical markers such as Homeostasis Model Assessment insulin resistance(HOMAIR) and Body Mass Index(BMI) in type 2 diabetic patients . This study includes (82) patients (40 females and 42 males) with age range (40-75) years,(34) non obese diabetic patients and (48) obese diabetic patients. The non obese individuals considered

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Factors associated with the phenomenon of marriage outside the court And the consequences of it A field study in Sadr City
...Show More Authors

Marriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
A Study of Drinking Water Properties in Some Hospitals in Baghdad City
...Show More Authors

One of the bigger problems in drinking water is disinfection by-products (DBPs) that come from chlorinated disinfection. This study’s goal was to evaluate the drinking water in Al-Yarmouk Teaching Hospital, Ibn Sina Hospital and Ibn-Al-Nafis Hospital.  Samples were collected between October 2018 and September 2019. Physical and chemical characteristics of the water were studied, including (temperature, hydrogen ion (pH), total dissolved solids (TDS), electrical conductivity (EC), turbidity, free residual chlorine, total organic carbon (TOC), total trihalomethanes (THMs), total halo acetic acid (THAAs)). Data analysis showed the highest value of study temperature, pH, TDS, EC, turbidity, free residual chlorine and TOC which was

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The Holy Totem in Qur’an, a study in the light of sociolinguistics
...Show More Authors

The sacred totem is one of the social phenomena that occupied the ideas of researchers, and took up a wide area of ​​their research, and it is one of those phenomena that emerged from one of the translations of the Tabu; Who took a psychological and anthropological analysis   Because it is one of the social practices, and the main focus of it is the human group and its source is religion. Therefore, this research came with demands, the first of which is to give a semantic concept of the Tommy sanctuary, and then the analytical aspect by standing on the sacred things in the Qur’anic text that God Almighty sanctified, and the third requirement is to examine what people have sanctified, as an analysis of the verses that have

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 20 2023
Journal Name
Al-esraa University College Journal For Medical Sciences
Nanoparticles Used in Treatment and Diagnosis of Leishmaniasis in Iraq: A Review
...Show More Authors

The aim of this paper is to identify Nano-particles that have been used in diagnosis and treatment of leishmaniasis in Iraq. All experiments conducted in this field were based on the following nanoparticles: gold nanoparticles, silver nanoparticles, zinc nanoparticles, and sodium chloride nanoparticles. Most of these experiments were reviewed in terms of differences in the concentrations of nanoparticles and the method that was used in the experiments whether it was in vivo or in vitro. These particles used in most experiments succeeded in inhibiting the growth of Leishmania parasites.

View Publication
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
World Neurosurgery
Letter to the Editor: Cadaver-Free Simulation Training in Microneurosurgery: An Experience From Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
Journal Of Engineering
Study on wind loads coefficients and flow field characteristics around the parabolic trough with stiffeners
...Show More Authors

wind load coefficient