Preferred Language
Articles
/
joe-367
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and its role in the protection of widows (Problems and advancement options) A field study in the Social Welfare Department for Women
...Show More Authors

Current search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis of 3 - 3 - gem - di - C -Nitromethyl Nucleoside Analogues of Possible Biological Activity
...Show More Authors

Synthesis of new nucleoside analogues of the type : 3¢ , 3¢ - gem – di – C – nitromethly , expected to have useful application in the chemotherapeutic treatment of AIDS , cancer and microbial infections. The synthesis involved the condensation of the appropriate sugar derivative ( i.e . 3¢ , 3¢ –  gem – di – C – nitromethly – 1–  ribofuranose ) with nitrogen bases , such as , uracil and theophllin following a multi step scheme starting from diacetone golucose (1) (scheme 1) .The prepared compound were identified by spectroscopic methods ; ir , mass , 1H and 13C nmr.

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 17 2024
Journal Name
Healthcare
Impact of Nonsurgical Periodontal Treatment of Periodontitis Stages 2 and 3 on Oral Health-Related Quality of Life
...Show More Authors

This study investigates the impact of nonsurgical periodontal treatment (NSPT) on oral health-related quality of life (OHRQoL) in patients with periodontitis stages (S)2 and S3, and the factors associated with the prediction of patient-reported outcomes. Periodontitis patients (n = 68) with moderately deep periodontal pockets were recruited. Responses to the Oral Health Impact Profile (OHIP)-14 questionnaire and clinical parameters including plaque index, bleeding on probing (BOP), probing pocket depth (PPD), and clinical attachment loss (CAL) were recorded. All patients received supra- and subgingival professional mechanical plaque removal. All clinical parameters and questionnaire responses were recorded again 3 months after NSPT.

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Two Different Doses of Zinc Sulfate on Serum Troponin I 3 Enzyme Level and Cardiac Malondialdehyde Contents in Mitoxantrone-Induced Cardiotoxicity in Rats
...Show More Authors

Abstract

   Mitoxantrone is an antitumor agent used in the treatment of breast and prostate cancer, acute leukemia, lymphoma, and also in the treatment of multiple sclerosis due to its immunosuppressive properties. The mitoxantrone's cardiotoxicity is irreversible, dose-dependent, and it may occur years after treatment. Zinc is considered as an essential mineral for cell division and the synthesis of DNA and protein; furthermore, such mineral has an important role in states of cardiovascular diseases; and may have protective effects in coronary artery disease and cardiomyopathy.

Objective: The current study is designed to investigate effects of two different doses of zinc sulfat

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
The 2nd Universitas Lampung International Conference On Science, Technology, And Environment (ulicoste) 2021
Study the effect of size variation and stability on the electronic and spectroscopic properties of BN wurtzoids- diamantane nanostructure via density functional theory
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Improve the Performance of PID Controller by Two Algorithms for Controlling the DC Servo Motor
...Show More Authors

The paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus