Preferred Language
Articles
/
jbcd-3317
Complete Blood Count and saliva parameters as an indicator for infected patients with coronavirus covid-19
...Show More Authors

Background: Coronavirus, which causes respiratory illness, has been a public health issue in recent decades. Because the clinical symptoms of infection are not always specific, it is difficult to expose all suspects to qualitative testing in order to confirm or rule out infection as a test. Methods: According to the scientific studies and investigations, seventy-three results of scientific articles and research  were obtained using PubMed, Medline, Research gate and Google Scholar. The research keywords used were COVID-19, coronavirus, blood parameters, and saliva. Results: This review provides a report on the changes in the blood and saliva tests of those who are infected with the COVID-19.COVID-19 is a systemic infection that has a substantial influence on the hematological system and hemostasis, thus deviations from normal levels of laboratory tests, including the blood and saliva test show that specific testing for detecting COVID-19 infection is required. Conclusions: The blood and saliva tests aid in the clinical monitoring of the patient's health.  It has advantages such as the following: it has non-invasive properties, low cost, and good stability, addition to minimum risk of infection transport.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Civilizations and Environmental Particulars of Place in Islamic Holy Thresholds in Iraq (Alkadhumain Holy Threshold as a case study)
...Show More Authors

Islamic shrines architecture is one of the Islamic Architectural building types. It is called (Thresholds); (Atabat) in Arabic. Thoroughbred throughout the Islamic world from the east to west. In addition, it carries the style features and peculiarities of uniqueness from the rest of the types of Islamic architecture. By virtue of the particularity of its function as tomb for important person in Islamic history. Islamic shrines architecture has grown and evolved in started from the small shrines, and then taken to widen with the evolution of time in line with the value of the event and the rituals associated with it. Some of them to became centers of large cities of the largest in many parts of the Islamic world.

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Automation in architecture and its effect on the regeneration of traditional buildings: Al-Shawi House as a case study
...Show More Authors
Abstract<p>The increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh</p> ... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
The social and psychological effects of ISIS in the conductive press An analytical study in the Iraqi newspapers “Economic City” and “Mosul News” for the period from 30/8/2017 until 31/7/2019 : (Research derived from Master Thesis)
...Show More Authors

The research seeks to find out the extent of the coverage of the Mosul press to the issues of psychological and social effects of the organization "IS" on the community of Mosul, by analyzing the content of the newspapers “Economic City” and “Mosul News”. As well as to stand at the types of psychological and social effects and their repercussions on the Mosul community including figures, statistics and evidence that were covered in the theoretical study of these topics.

This study is the first scientific diagnosis to reveal the size and types of psychological and social effects of the “ISIS” organization  through what was monitored by the Mosul press. The study seeks to draw the attention of officials, decision-m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Product of Conjugacy Classes of the Alternating Group An
...Show More Authors

For a nonempty subset X of a group G and a positive integer m , the product of X , denoted by Xm ,is the set Xm = That is , Xm is the subset of G formed by considering all possible ordered products of m elements form X. In the symmetric group Sn, the class Cn (n odd positive integer) split into two conjugacy classes in An denoted Cn+ and Cn- . C+ and C- were used for these two parts of Cn. This work we prove that for some odd n ,the class C of 5- cycle in Sn has the property that = An n 7 and C+ has the property that each element of C+ is conjugate to its inverse, the square of each element of it is the element of C-, these results were used to prove that C+ C- = An exceptio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Leverage: An Empirical Research
...Show More Authors

The research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Derivative of an image that corrupted by additive noise
...Show More Authors

In this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Lease: An Empirical Study
...Show More Authors

The Purpose of this study are  analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial  lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF