Preferred Language
Articles
/
aBd7t44BVTCNdQwChVcy
Phylogenetic Relationship of Iraqi Vespa orientalis Linnaeus 1771 Wasps Using Mitochondrial CO1
...Show More Authors
Abstract<p>Oriental wasps are scavengers, and they have also represented an enormous issue for beekeepers, they destroy beehives and reduce the flight of bees. In addition, the sting of hornets may cause medical problems, which differ according to the response of the individuals, including severe sensitivity, swelling, and slight pain. This study provides the first molecular phylogeny of the oriental wasp <italic>Vespa orientalis</italic> L. in Iraq. Mitochondrial DNAs of the 547bp fragment cytochrome oxidase subunit 1 (CO1) area were sequenced and analyzed from 10 wasp specimens collected in the north, middle, and south of Iraq. The CO1 gene found in the Iraqi isolates was used to create a Bayesian interference. Maximum likelihood (ML) was used to create the phylogenetic tree. Results, according to the results of the phylogenetic analysis, the CO1 gene may be used to positively identify every sample, and there is a close connection between the sequences of samples from various regions of Iraq, with 100% of the samples clustering together. PCR successfully amplified 547bp products for all examined oriental wasp samples. Considering the similarity in the sequences, the Iraqi local species are classified as <italic>V. orientalis</italic>. Conclusion, in this study, <italic>V. orientalis</italic> isolates which were collected from different geographical regions in Iraq were closed and there was low variation. The DNA barcode component of CO1 was found to be an effective method for the quick and precise identification of Iraqi oriental wasps.</p>
Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Biochemical And Cellular Archives
Effect of HPV infection on the expression of fibronectin in a group of Iraqi women with cervical carcinoma
...Show More Authors

: Cervical malignancy positioned as the fourth most prevalent disease among women around the world. HPVs especially HPV16 are the causative agent of cervical cancer, responsible of about 5% of all human cancers worldwide. Some researchers found that the fibronectin is repressed by the papillomavirus (HPV) type 16 E7 oncoprotein in both HPV-positive nontumorigenic and tumorigenic cell lines, while others found that the HPV oncoprotein increase the levels of fibronectin. The aim is to study the effect of HPV infection on Fibronectin expression and their correlation onthe development of Cervicalcancinoma. The current retrospective study enrolled paraffinized blocks of two groups. The research included 30 cervical carcinomatous tissues as well

... Show More
Scopus (4)
Scopus
Publication Date
Sun Jun 22 2025
Journal Name
University Of Baghdad
Role of Osteopontin Gene Polymorphism and Certain Types of Interleukins in Pathophysiology of Osteoporosis in Iraqi postmenopausal Women
...Show More Authors

Osteoporosis (OP) is asymptomatic disease until the experience of falls or impacts that cause broken bones or fractures happened. Estrogen deficiency, abnormality in bone matrix components and interleukins expression can impact on bone homeostasis which gradually paved to osteoclastogenesis over activation leading to bone loss. A current case-control study was designed to explain the alteration in certain biochemicals, bone matrix components, immunological and molecular parameters that which accompanied with OP in the postmenopausal women. The period of study's investigation was from December 2022 to July 2023. All participants provided written informed consent, and the study was approved by Department of Biology, College of Science, U

... Show More
Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Characteristics of Melody Structure of the Cello and Contrabass in Works of Iraqi Symphony Orchestra: تقى سعد جعفر
...Show More Authors

The idea of this research is based on presenting a study specialized with the rules and bases of the Iraqi methodological music composition of the Symphony Orchestra according to the construction of the musical compositions of great forms and which are characterized by the melody difference and variation within their musical fabric according to the method of distributing the instruments and their types within the orchestra. The researcher has been interested in studying this building based on what is written for him according to the stringed instruments arc instruments and bass, which is represented by the cello and the contrabass. It is possible through the analysis of the melody structure features of these instruments and the melody re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF