Preferred Language
Articles
/
bsj-693
The effect of temperature and density of different host spam in efficiency and performance life of the intruder
...Show More Authors

Studied competence spam to malicious moth figs at temperatures and Kagafat host different results showed that female intruder, despite their ability to shell larvae host and when densities of different, but it is able to lay eggs at a temperature of 14 + or -1 and finally urged the efficiency spam to malicious affected heavily host and that the greater the intensity of the host spam increased efficiency and its performance life

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 22 2021
Journal Name
Nanomaterials
Melting Enhancement in a Triple-Tube Latent Heat Storage System with Sloped Fins
...Show More Authors

Due to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions throug

... Show More
View Publication
Scopus (38)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
ADAPTIVE CYCLIC PREFIX LENGTH FOR CONVOLUITIONAL CODE OFDM SYSTEM IN FREQUENCY SELECTIVE CHANNEL
...Show More Authors

Orthogonal Frequency Division Multiplexing (OFDM) is one of recent years multicarrier modulation used in order to combat the Inter Symbol Interference (ISI) introduced by frequency selective mobile radio channel. The circular extension of the data symbol, commonly referred to as cyclic prefix is one of the key elements in an OFDM transmission scheme. This paper study The influence of the cyclic prefix duration on the BER performance of an OFDM-VCPL (Orthogonal frequency division multiplexing - Variable Cyclic Prefix Length) system and the conventional OFDM system with frame 64-QAM modulation is evaluated by means of computer simulation in a multipath fading channel. The adaptation of CP is done with respect to the delay spread estimation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 15 2020
Journal Name
Pharmacy Practice
Barriers to healthcare access for Arabic-speaking population in an English-speaking country
...Show More Authors

Objective: To identify barriers to healthcare access, to assess the health literacy levels of the foreign-born Arabic speaking population in Iowa, USA and to measure their prevalence of seeking preventive healthcare services. Methods: A cross-sectional study of native Arabic speaking adults involved a focus group and an anonymous paper-based survey. The focus group and the Andersen Model were used to develop the survey questionnaire. The survey participants were customers at Arabic grocery stores, worshippers at the city mosque and patients at free University Clinic. Chi-square test was used to measure the relationship between the characteristics of survey participants and preventive healthcare services. Thematic analysis was

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force in relation to maximum mouth opening among primary school children
...Show More Authors

Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed by de

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Mechanical Science And Technology
Damage detection in glass/epoxy composite structure using 8–12 GHz X-band
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Theory And Practice In Language Studies
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Oct 14 2019
Journal Name
Turkish Journal Of Biology
E2F6 is essential for cell viability in breast cancer cells during replication stress
...Show More Authors

Abstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (118)
Crossref (111)
Scopus Clarivate Crossref