Preferred Language
Articles
/
ijp-1077
Design and Construction of a Dust Detection System using Infrared Laser: The Case of Dust Storms in Baghdad in the Summer 2022
...Show More Authors

Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.

The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, which were detected using a digital storage oscilloscope.

These studies were conducted during the dust storms that occurred intensely in Baghdad in the months (April, May, June and July) of the year 2022. Where multiple samples were taken at different periods in these storms, measurements were also done during the storm. The types of polluting elements found in the dust of the storms are: carbon, bromine, chlorine, hydrocarbons alcohol, ether, hydroxyl group, carbon, C=C (aromatic ring), nitrogen dioxide (aromatic nitro), and carbon monoxide. The value ​​of dust pollutant concentrations is (125.67 mg. m-3).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Organizational Change in the Development of the Insurance Service: (applied study in The National Insurance Company)
...Show More Authors

تشهد بیئة الأعمال المعاصرة جملة من التغیرات والتطورات التكنولوجیة وتزایداً في حدةالمنافسة، وأتساع الفجوة بین العاملین والإدارة ، وقدرة الإدارة على التمییز بین الموظفین، والمشاركة فيإتخاذ القرارات، الامر الذي یلقي على عاتق شركة التأمین إجراء التغییر التنظیمي لتحقیق تطور فيالخدمات التأمینیة التي تقدمها للجمهور من تنوع التغطیات التأمینیة )الوثائق( والسرعة في تسویةالتعویضات وغیرها من الانشطة التي تمارسه

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Flame Atomic Absorption Spectrophotometry Analysis of Heavy Metals in Some Food Additives Available in Baghdad Markets, Iraq
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Flame Atomic Absorption Spectrophotometry Analysis of Heavy Metals in Some Food Additives Available in Baghdad Markets, Iraq
...Show More Authors

Flame atomic absorption spectrophotometer (FAAS) was used in this study to determine the concentrations of heavy metals such as Ca, Fe, Mn, Cd, Co, Cr, Ni, Cu, Pb and Zn in some food additives of Iraq. The order of metal contents in food additives was found to be Ca ˃ Mn ˃ Fe ˃ Cu ˃ Zn ˃ Pb ˃ Cr ˃ Ni ˃ Co ˃ Cd. The concentration level of each metal was compared with that recommended by food agriculture organisation (FAO) and world health organisation (WHO). Calibration curves were linear for all standard solutions of heavy metals in the range starting from 0.02-0.4 mg/kg for Cd to 11-100 mg/kg for Ca. The correlation coefficients values (R2) of calibrations were investigated and ranged from 0.9971 for Cr to 0.9999 for Ca. Th

... Show More
Scopus (15)
Scopus
Publication Date
Sun Oct 29 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Nurses' Practices in Intensive Care Units Following Coronary Artery Bypass Grafting Patients in Baghdad City
...Show More Authors

Objective: To evaluate nurses' practices toward coronary artery bypass grafting (CABG) patients in the
intensive care units (ICU) and to find out the relationship with some vanables.
Methodology: A purposive sample of (50) staff nurses was selected out of three hospitals for cardiac surgery.
The study instmment consisted of two major sections was constructed. It is based on the review of literature.
First it is concerned with demographic data for nurses; and the second section is observationaL tool (checklist) is
composed of six parts in which there mere (78) items. Reliability and validity of the observational checklist were
determined through the analysis of a pilot study.
Data were collected through the use of the

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Molecular Investigation of Curli Fimbriae Genes in Enterobacter cloacae Isolated from Various Clinical Sources in Baghdad, Iraq
...Show More Authors

Thirteen isolates were collected from various clinical sources during the periodfrom 22/10/2017 to 22/12/2017. All the isolates were diagnosed based on the microscopic and biochemical propertiesby Vitek-2 Compact system. All isolates formed biofilm 100%, with 30% of isolatesbiofilm produced strongly and 70% on medium. The results of the present study have shown the presence of Curli fimbriae genes in E. cloacae bacteria from cases of urinary tract infections, infected patient with blood bacteremia and inflammation of wounds. Curli fimbriae is considered to be an important factor in the virulence of E.cloacae bacteria, which plays an important role in adhering and combining cells on solid surfaces to form the biofilmand helps in the adhesion

... Show More
Scopus (2)
Scopus
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (12)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Women and Symbol In the stories of Mowaffaq Khadr
...Show More Authors

The world of Muwaffaq Khidr Al-Qasasi has a clear and realistic orientation. This trend is in full harmony with his philosophy and vision of life and things. Through self-awareness is nothing but an expression of an imbalance in the interaction between self and reality, and it remains lacking in credibility.

View Publication Preview PDF