Preferred Language
Articles
/
TRd9XI8BVTCNdQwCjW6I
Vesicular Trafficking Defects, Developmental Abnormalities, and Alterations in the Cellular Death Process Occur in Cell Lines that Over-Express Dictyostelium GTPase, Rab2, and Rab2 Mutants
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Mar 06 2026
Journal Name
Journal Of Baghdad College Of Dentistry
A Salivary Calcium Binding Protein in Patients with Oral Squamous Cell Carcinoma in Relation to Smoking
...Show More Authors

Background: The present study aimed to assess the distribution, prevalence, severity of malocclusion in Baghdad governorate in relation to gender and residency Materials and Methods: A multi-stage stratified sampling technique was used in this investigation to make the sample a representative of target population. The sample consisted of 2700 (1349 males and 1351 females) intermediate school students aged 13 years representing 3% of the total target population. A questionnaire was used to determine the perception of occlusion and orthodontic treatment demand of the students and the assessment procedures for occlusal features by direct intraoral measurement using veriner and an instrument to measure the rotated and displaced teeth. Results a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Journal Of Environmental Chemical Engineering
A critical review describes wastewater photocatalytic detoxification over Bi5O7I-based heterojunction photocatalysts: Characterizations, mechanism insight, and DFT calculations
...Show More Authors

View Publication
Scopus (49)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Fault Location of Doukan-Erbil 132kv Double Transmission Lines Using Artificial Neural Network ANN
...Show More Authors

Transmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Solving high sulfate content of sand used in concrete by magnetic water process
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mathematical Modeling of a Hollow Fiber Module Used in Pressure-Retarded Osmosis Process
...Show More Authors

   Pressure retarded osmosis (PRO) can be considered as one of the methods for utilizing osmotic power, which is a membrane-based technology. Mathematical modeling plays an essential part in the development and optimization of PRO energy-generating systems. In this research, a mathematical model was developed for the hollow fiber module to predict the power density and the permeate water flux theoretically. Sodium chloride solution was employed as the feed and draw solution. Different operating parameters, draw solution concentration (1 and 2 M), the flow rate of draw solution (2, 3, and 4 L/min), and applied hydraulic pressure difference (0 - 90 bar) was used to evaluate the performance of PRO process of a hollow fiber module. The eff

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Isolation and Identification of Flavonoid Compounds from Euphorbia Milii Plant Cultivated in Iraq and Evaluation of its Genetic Effects on Two Types of Cancer Cell Line
...Show More Authors

يعتبر "تاج الأشواك" أو نبات شوكة المسيح، وهو من نباتات الزينة الطبية ، ينتمي إلى جنس يوفوربيا. E. milii يحتوي كميات وفيرة من المركبات الفينولية ، التربينات، الستيرويدات والقلويدات. كانت الأهداف الرئيسية لهذه الدراسة هي فحص مستخلصات الفلافونويد والنانو فلافونويد ضد نوعين من خطوط الخلايا السرطانية. تم تصنيع مركبات الفلافونويد النانوية عن طريق تفاعل مركب الكيتوسان والماليك اسد. تم تحليل مركبات الفلافونويد ال

... Show More
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 27 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Synthesis, Characterization and Anticancer Activity of Chitosan Schiff Base / PEG Blend Doped with Gold and Silver Nanoparticles in Treatment of Breast Cancer Cell Line MCF-7
...Show More Authors

In the present study, chitosan Schiff base has been prepared from chitosan reaction with p-chloro benzaldehyde. The AuNPs and AgNPs were manufactured by extract of onion peels as a reducing agent. The AuNPs and AgNPs that have been synthesized were characterized through UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan / PEG has been prepared by using the approach of solution casting. Chitosan Schiff base / PEG Au and Ag nanocomposites were synthesized, nanocomposites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1693 cm-1 as a result of the (C=N) imine group. FESEM, DSC and TGA confirm the thermal stability

... Show More
Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref