Preferred Language
Articles
/
jmracpc-277
COMPARISON BETEEEN THE CONSUMPTION OF RED MEAT AND WHITE MEAT FOR ASAMPLE OF CITIZENS OF THE CITY OF BAGHDAD/ AN EXPLORATORY STUDY : COMPARISON BETEEEN THE CONSUMPTION OF RED MEAT AND WHITE MEAT FOR ASAMPLE OF CITIZENS OF THE CITY OF BAGHDAD/ AN EXPLORATORY STUDY
...Show More Authors

Three hundred Iraqi people participated in demographic and attitudes study about red and white meat consumption. The mean age of the participants was 50 SD ± 11 years (mean 30-72); 51% were females and 49% males, mostly in forties who lived ≥ 5 years in Baghdad. The results showed that 80% of individuals prefer red meat. A 90% of people prefer fresh meat compared to frozen and processed meat. A 60% of people buy meat from popular markets. Nearly 87% of respondents believe the improving of livestock sector is essential and 80% of people confirmed there are obstacles to development this sector. An 80% of participates thought the reasons of the high prices of local fresh meat is the lack of planning and support to livestock sector. A survey also include chronic diseases assessment, a 60% of the individuals suffer from some chronic diseases, 23% of them suffer from cardiovascular diseases, 13% from diabetes, 21% had arthritis, and 3% were exposed to various types of benign or malignant tumors. In addition, the study appeared 30% of the sample suffered from gastrointestinal diseases such as diarrhea, colic, colitis, and acidity of the stomach and 21% were suffering from urinary problems. It has noticed that there is risk factor of urinary system diseases, arthritis and diabetes with excessive consumption of red meat. We recommend more attention to the local livestock sector and urging people to eat moderation of fresh and white meat, reduce red meat consumption.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (33)
Crossref (24)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Sep 08 2024
Journal Name
Al Rafidain Journal Of Engineering Sciences
Oscillating Heat Pipe Start-up and Flow Characteristics with Water as Working Fluid
...Show More Authors

Thermal management has grown more and more problematic as electronic components continue to get faster and smaller. One of the passive two-phase cooling systems are Oscillating heat pipe (OHP) that have the capacity to transmit a significant quantity of thermal energy across long distances. Oscillating heat pipe is a device that has the potential to satisfy this developing requirement. An investigation into the effects of orientation, filling ratio, and heat load on the initiation and characteristics of oscillatory motion, combining numerical simulations with experimental validation. A copper tube with a 2 mm inner diameter and a 2 mm wall thickness is used to fabricate the OHP. The condenser, evaporator, and adiabatic sections are

... Show More
View Publication
Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Exploitation decision and impact factors in improvement in stock exchange markets proportion investment small
...Show More Authors

The purpose of the search definition on factors superior this whoever  impact on the improvement the exploitation  decision this  detect on stock exchange markets  assumption , and using  questioners to data accumulate  and the Iraq market of financial papers  battleground to search annoy chose the eyeball extension (47) peoples from peoples employees on the market , and using the bought statistic program (SPSS) on input and analysis search  data , and machinate the search outputs to their group of factors internal and external which impact on exploitation  decision on financial papers markets , and the search commend on necessary rise  the incumbency direction  in the stock exchange

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Salivary protein carbonyl and selected antioxidants in relation to dental caries among pregnant women
...Show More Authors

Background: Pregnancy is a physiological condition that affects the general and oral health.It is also associated with an increase in oxidative stress, which may presispose to oral diseases including dental caries. Aim of the study: This study aimed to measure salivary protein carbonyl, glutathione peroxidase and selenium levels of women who are pregnant and their association with dental caries in comparison to non-pregnant women, and to find out the mostly affected biomarker of oxidative stress during pregnancy. Subjects, materials and methods: A cross-sectional research was performed for a samples of 30 pregnant and 30 non-pregnant women who were chosen from city of Baghdad's Primary Healthcare Centers. Both groups aged 25-30 years. In

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref