Preferred Language
Articles
/
RRaLvIsBVTCNdQwCuNnn
Effect of the addition of guanidinoacetic acid to the dilute tris in some of the biochemical characteristics of the semen of the rams
...Show More Authors

The study was planned to evaluate the effect of adding Guanidinoacetic acid in some characteristics of the sperm of the rams. This study was conducted in the animal field of the Animal Production Department / Faculty of Agricultural Engineering Sciences / University of Baghdad, for the period from 5/8/2018 to 28/2/2019. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-54 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: GAA-free control group, treatment T1 (0.05 mg / 100 ml GAA), T2 treatment (0.1 mg / 100 ml GAA) and T3 treatment (0.2 mg / 100 ml GAA). The results of the study showed a significant decrease in the concentration of malondialdehyde at time (0 and 72 hours) from cryopreservation in treatment T3 compared with the rest of the treatments. There were no significant differences between time-saving coefficients (0) in AST concentration. The AST concentration of time was reduced by 72 hours of conservation in T3 compared to control. ALT concentration was significantly reduced in T3 when conserved by time (0 and 72 hours) of cryopreservation compared with other treatments. The concentration of glutathione significantly increased at time T3 (0 and 72 h) from preservation of cooling. SOD concentration was significantly increased in T3 (0 and 72 hours) of conservation. There was no significant effect of GAA in creatine kinase activity throughout the experiment.

Scopus
View Publication
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Fat Mass and Obesity Association gene Polymorphism in PCOS Iraqi Women
...Show More Authors

             Polycystic syndrome (PCOS) is a considerable infertility disorder in adolescents and adult women in reproductive age. Obesity is a vigorous risk factor related to POCS.  This study aims to evaluate the association of obesity and PCOS by investigating several parameters including:  anthropological, biochemical (lipid profile, fasting blood sugar, glucose tolerance test, and hormone levels (LH, FSH, LH/FSH ratio, Estradiol2 and Testosterone),and genetic parameters (Fat mass and Obesity associated gene (FTO) polymorphism at rs17817449) in 63 obese and non-obese PCOS women. The biochemical tests were investigated by colorimetric methods while FTO gene polymorphism was detected by PCR–RFLP.  Lipid profile, F

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
Robust speaker verification by combining MFCC and entrocy in noisy conditions
...Show More Authors

Automatic speaker recognition may achieve remarkable performance in matched training and test conditions. Conversely, results drop significantly in incompatible noisy conditions. Furthermore, feature extraction significantly affects performance. Mel-frequency cepstral coefficients MFCCs are most commonly used in this field of study. The literature has reported that the conditions for training and testing are highly correlated. Taken together, these facts support strong recommendations for using MFCC features in similar environmental conditions (train/test) for speaker recognition. However, with noise and reverberation present, MFCC performance is not reliable. To address this, we propose a new feature 'entrocy' for accurate and robu

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (13)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Chlorine concentration-time (C-T) plot for Echhornia Crassipes in water
...Show More Authors
Abstract<p>Eichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
حوليات أداب عين شمس
Peace building in Multiple Communities: South Africa is a case study
...Show More Authors

المستخلص [English] Peace-building is a science that has its foundations and needs mechanisms, components, studies and plans based on the needs of the parties responsible for achieving peace and meeting the necessary needs of conflict societies, as it has become a goal sought by many local and regional actors and parties. The State of South Africa has realized this fact and has devoted space in its conception and planning to addressing the issues of conflict and war within the framework of its unitary work.Since security and stability in general seek to create peaceful and legal means through which existing problems can be expressed and addressed. The differences have varied to build peace and create cooperation between groups and th

... Show More
View Publication
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Informatics And Computing In Civil And Construction Engineering: Proceedings Of The 35th Cib W78 2018 Conference: It In Design, Construction, And Management
Technology alternatives for workplace safety risk mitigation in construction: Exploratory study
...Show More Authors

Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A Multilevel Approach for Stability Conditions in Fractional Time Diffusion Problems
...Show More Authors
Abstract<p>The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr</p> ... Show More
View Publication
Scopus Crossref