Preferred Language
Articles
/
cRas1osBVTCNdQwCy-Gf
IRRIGATION METHODS AND ANTI-TRANSPIRATION AS RELATED TO WHEAT AND WATER PRODUCTIVITY
...Show More Authors

View Publication
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Relation of ?-Amylase Activity with Glucose and Anti-Gliadin IgA and IgG in Sera of Patients with Celiac Disease
...Show More Authors

Celiac disease (CD) is an inflammatory small intestinal disorder that can lead to severe villous atrophy, and malabsorption . Since the measurement of α-amylase activity is the most widely used biochemical test for the diagnosis of pancreatic and non pancreatic disease , therefore serum α-amylase were studied in the present study in an attempt to evaluate the usefulness of this enzyme in the diagnosis of celiac disease and its relationship with anti gliadin IgA and IgG and serum glucose . Thirty one patients with celiac disease were studied and compared with twenty four healthy individuals . Significant elevation of α-amylase activity , glucose and anti gliadin IgA and IgG were observed in the sera of patients with celiac diseas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 13 2024
Journal Name
Journal Of Robotics
Hierarchical Stabilization and Tracking Control of a Flexible-Joint Bipedal Robot Based on Anti-Windup and Adaptive Approximation Control
...Show More Authors

Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Bahrain Medical Bulletin
Challenges Facing Nurses Toward Providing Care to Patients with Cerebrovascular Accidents: A Mixed Methods Study
...Show More Authors

Background: Understanding the challenges facing nurses toward providing care to patients with cerebrovascular accidents is the initial step in developing strategies to address these challenges, thereby ensuring high-quality care. Aim: The study aimed to assess the challenges experienced by nurses in delivering care to patients with CVAs in neurological wards. Results: Of the 80 questionnaire participants in the qualitative part, (MS = 0.66) reported a "moderate" rating as an overall assessment. These challenges are divided into workload (MS = 0.53) at a moderate rate, the psychological burden (MS = 0.85) at a high rate, the supporting materials (MS = 0.85) at a high rate, the sense of responsibility (MS = 0.77) at a high rate, and the role

... Show More
Scopus (2)
Scopus
Publication Date
Sat Sep 02 2017
Journal Name
Dissertation
Integrating Biophysical and Socio-Economic Approaches to Identify Suitable Policy Incentives for Enhancing Sustainable Water and Land Use (WLI project a case study of Iraq)
...Show More Authors

Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Partial Least Squares and Principal Components Methods by Simulation
...Show More Authors

Abstract                                                                                              

The methods of the Principal Components and Partial Least Squares can be regard very important methods  in the regression analysis, whe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Engineering And Management Journal
TREATMENT OF DAIRY WASTEWATER BY ELECTROCOAGULATION AND ULTRASONIC-ASSISTED ELECTROCOAGULATION METHODS
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Properties of Kumaraswamy binary Distribution and compare methods of estimating parameters
...Show More Authors

The recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli

... Show More
View Publication Preview PDF
Crossref