Preferred Language
Articles
/
ijl-150
Warts Treatment by 810 nm Diode Laser Irradiation: A New Approach
...Show More Authors

The present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain occurred for about 1 week after treatment especially on movement (when lesions near joint) to all group and power density. Oozing occurred from lesion with scales and oedema after laser treatment for about 1 week. Post-inflammatory hypo-pigmentation might occur after the lesion have healed completely. No recurrence of lesions after complete healing of lesions. Complete healing of the lesion was noticed, no scarring after complete healing of lesion. Diode laser therapy of recalcitrant and extensive viral warts could be considered as a valuable alternative to other more traditional techniques. This treatment can offer a good result in eliminating the verrucae and their sequelae of recurrence, scarring and the post-operative pain.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of Lean Management Approach on Human Resource Management Practices A field research in telecom companies in Iraq (Zain-Asia cell)
...Show More Authors

Abstract

The current research is attempt to test the reflection of the lean management on the human resources management practices of two of the most important communication companies operating in Iraq (`Zain & Asia cell), The research aims to Determine the extent of adoption of the lean management approach in the two researched companies, as it improving human resource management practices. The research problem represented in the existence of lack of in some aspects of the application the lean management approach in service sector and neglecting the impact of its tools on the human resource management practices. For this purpose three principle research hypotheses has been formulated, first there is a correlation rel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (22)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Cooling and Heating a Greenhouse in Baghdad by a Solar Assisted Desiccant System
...Show More Authors

Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Aeroelastic Behavior of a Wind Turbine Blade by a Fluid -Structure Interaction Analysis
...Show More Authors

In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between

... Show More
View Publication Preview PDF
Publication Date
Fri May 22 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (4)
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Iraqi Geological Journal
Mineral Inversion Approach to Improve Ahdeb Oil Field's Mineral Classification
...Show More Authors

Knowledge of the mineralogical composition of a petroleum reservoir's formation is crucial for the petrophysical evaluation of the reservoir. The Mishrif formation, which is prevalent in the Middle East, is renowned for its mineralogical complexity. Multi-mineral inversion, which combines multiple logs and inversions for multiple minerals at once, can make it easier to figure out what minerals are in the Mishrif Formation. This method could help identify minerals better and give more information about the minerals that make up the formation. In this study, an error model is used to find a link between the measurements of the tools and the petrophysical parameters. An error minimization procedure is subsequently applied to determine

... Show More
View Publication
Scopus (7)
Scopus Crossref