Preferred Language
Articles
/
_0JjjpoBMeyNPGM3-81j
Evaluation and quantification of Fe3O4 concentrations in deposits formed inside Iraqi gas supply pipelines using a chemiluminescence method based on flow injection analysis
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
Pakistan Journal Of Medical And Health Sciences
The Effect of Hand Blood Flow on the Peripheral Fingertip Plethysmographic Waveforms Morphology and Pulse Wave Velocity
...Show More Authors

Photoplethysmography (PPG) is a non-invasive optical technique that employs variations in light absorption produced by alteration in the blood volume in capillaries at the skin during the cardiac cycle. This study aims to understand factors related to PPG morphology; a hand-elevation, the study has modified blood flow to and from the finger was conducted in the laboratory. It is widely established that the position of the limb relative to the heart has an effect on blood flow in arteries and venous. Peripheral digital pulse wave (DPW) signals were obtained from 15 healthy volunteer participants during hand-elevation, and hand-lowering techniques wherein the right hand was lifted and lowered relative to heart level, while the left h

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Oct 29 2020
Journal Name
Complexity
Training and Testing Data Division Influence on Hybrid Machine Learning Model Process: Application of River Flow Forecasting
...Show More Authors

The hydrological process has a dynamic nature characterised by randomness and complex phenomena. The application of machine learning (ML) models in forecasting river flow has grown rapidly. This is owing to their capacity to simulate the complex phenomena associated with hydrological and environmental processes. Four different ML models were developed for river flow forecasting located in semiarid region, Iraq. The effectiveness of data division influence on the ML models process was investigated. Three data division modeling scenarios were inspected including 70%–30%, 80%–20, and 90%–10%. Several statistical indicators are computed to verify the performance of the models. The results revealed the potential of the hybridized s

... Show More
View Publication
Scopus (57)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Evaluation the Effects of CO2 Laser on Soft and Hard Tissues (in vitro study)
...Show More Authors

CO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Ceramics International
Surface structural features and optical analysis of nanostructured Cu-oxide thin film coatings coated via the sol-gel dip coating method
...Show More Authors

View Publication
Scopus (37)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Large Angle Bending Behavior of Curved Members Using The Method of Characteristics
...Show More Authors

This paper deals with the nonlinear large-angle bending dynamic analysis of curved beams which investigated by modeling wave’s transmission along curved members. The approach depends on the wave propagation in one-dimensional structural element using the method of characteristics. The method of characteristics (MOC) is found to be a suitable method for idealizing the wave propagation inside structural systems. Timoshenko’s beam theory, which includes transverse shear deformation and rotary inertia effects, is adopted in the analysis. Only geometrical non-linearity is considered in this study and the material is assumed to be linearly elastic. Different boundary conditions and loading cases are examined.

From the results obtai

... Show More
View Publication
Publication Date
Tue Dec 20 2022
Journal Name
Iraqi Journal Of Biotechnology
Green Method Synthesis of Silver Nanoparticles Using Leaves Extracts of Rosmarinus officinalis
...Show More Authors

The silver nanoparticles synthesized have to be handled by humans and must be available at cheaper rates for their effective utilization; thus, there is a need for an environmentally and economically feasible way to synthesize these nanoparticles. Therefore, this study aimed to synthesis of silver nanoparticles using phenolic compounds extracted from Rosmarinus officinalis. The maceration method and Soxhlet apparatus were used to prepare aqueous and methanolic Rosmarinus officinalis leaves extracts respectively, Furthermore, Rosmarinus officinalis silver nanoparticles (RAgNPs) were prepared from the aqueous and methanolic leaves extract of this plant and diagnosed using the ultraviolet (UV) spectroscopy, scanning electron microscopy (SEM),

... Show More
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref