Preferred Language
Articles
/
bijps-1637
Treatment of Helicobacter Pylori Infections Using Moxifloxacin-Triple Therapy Compared to Standard Triple and Quadruple Therapies
...Show More Authors

Helicobacter pylori (H. Pylori) is one of the most common infectious human pathogens. H. pylori could induce inflammation, that causes illnesses and disorders of upper gastrointestinal which including peptic ulcer diseases, dyspepsia, gastroesophageal reflux disease and gastric mucosa-associated lymphoid tissue (MALT) lymphoma. It is important to use a better tolerated and greatly effective eradication regimen. In this study, 75 newly diagnosed adult patients with H. pylori infection were included and completed the study, they were allocated into three groups with three different treatment regimens for H. pylori eradications; Group A (25 patients) received oral standard clarithromycin-based triple therapy for 14 days. Group B (25 patients) received oral bismuth based-quadruple therapy for 10 days. Group C (25 patients) received oral moxifloxacin-based triple therapy for 14 days. The results reported in this study indicated a significant higher eradication rate of Group B and Group C (84% and 80%, respectively) of patients with H. pylori infections compared to that of Group A (52%). The incidence of adverse effects were appeared as 72%, 64% and 24% of patients in group A, B and C respectively. The use of moxifloxacin triple regimen for H. pylori eradication, present with eradication efficacy parallel to that of quadruple regimen which were significantly higher compared to that of clarithromycin triple regimen. Also moxifloxacin triple therapy is more tolerable and does not increase the incidence of overall adverse effects compared to other regimens used in this study.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Oct 25 2023
Journal Name
2023 Ieee 8th International Conference On Engineering Technologies And Applied Sciences (icetas)
Vibration Characteristics of Perforated Plate using Experimental and Numerical Approaches
...Show More Authors

Vibration analysis plays a vital role in understanding and analyzing the behavior of the structure. Where, it can be utilized from this analysis in the design process of the structures in different engineering applications, check the quality and safety of the structure under different working conditions. This work presents experimental measurements and numerical solutions to an out of plane vibration of a rectangular plate with a circular hole. Free edges rectangular plates with different circular holes diameters were studied. The effects of hole location on the plate natural frequencies were also investigated. A finite element modeling (using ANSYS Software) has been used to analyze the vibration characteristics of the plates. A good agree

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Saudi Medical Journal
Treatment of perniosis with oral pentoxyfylline in comparison with oral prednisolone plus topical clobetasol ointment in Iraqi patients.
...Show More Authors

AA Noaimi, BM Fadheel, Saudi medical journal, 2008 - Cited by 25

View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Treatment with Dielectric Barrier Discharge (DBD) plasma restricts Aspergillus niger growth isolated from wheat grain
...Show More Authors

Microbiological contamination by fungi impacts the quality and safety of wheat grain storage. This study aimed to evaluate the efficacy of cold plasma in restricting the growth of the fungus, Aspergillus niger, which was isolated from wheat grains. A dielectric barrier discharge (DBD) operating at atmospheric pressure generated cold plasma that was used to treat the fungus, and the impact of this treatment was investigated at various periods  1, 2, 4, 6, and 15 minutes. The results revealed a highly significant decrease in the growth and number of spores of Aspergillus niger compared to the controls. This study revealed an efficient technique for enhancing wheat grain storage that could be a foundation for further large-scale studies.

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref