Preferred Language
Articles
/
xBdjbI4BVTCNdQwCRUdC
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 12 2019
Journal Name
Journal Of Global Pharma Technology,
Bentonite as an adsorption surface for bromothymol blue dye from aqueous solution
...Show More Authors

Scopus
Publication Date
Thu Jul 14 2022
Journal Name
Egyptian Journal Of Medical Human Genetics
A single-nucleotide polymorphism of IL12A gene (rs582537 A/C/G) and susceptibility to chronic hepatitis B virus infection among Iraqi patients
...Show More Authors

A case–control study (80 patients with chronic hepatitis B virus [HBV] infection and 96 controls) was performed to evaluate the association of an IL12A gene variant (rs582537 A/C/G) with HBV infection. Allele G showed a signifcantly lower frequency in patients compared to controls (31.2 vs. 46.9%; probability [p]=0.009; corrected p [pc]=0.027) and was associated with a lower risk of HBV infection (odds ratio [OR]=0.49; 95% confdence interval [CI]=0.29–0.83). A similar lower risk was associated with genotypes CG (17.5 vs. 29.2; OR=0.25; 95% CI=0.08–0.81; p=0.02) and GG (10.0 vs. 16.7; OR=0.25; 95% CI=0.07–0.91; p=0.036), but the pc value was not signifcant (0.12 and 0.126, respec‑ tively). Serum IL35 levels showed signifcant difere

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
The relationship of implant stability quotient and insertion torque in dental implant stability
...Show More Authors

Background: The insertion torque (IT) values and implant stability quotient (ISQ) values are the measurements most used to assess primary implant stability. This study aimed to assess the relationship between ISQ values and IT. Materials and methods: This study included 24 patients with a mean (SD) age of 47.9 (13.64) years (range 25-75 years). The patients received 42 dental implants (DI), 33 in the mandible and 9 in the maxilla. The DI were installed using the motorized method with 35 Ncm torque, When DI could not be inserted to the requisite depth by the motorized method, a hand ratchet was used and the IT was recorded as ˃ 35 Ncm. Implant stability was measured utilizing Osstell® ISQ. The secondary stability was measured after 16

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (8)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and Verification of the Hydraulic Model for Blue Nile River from Roseires Dam to Khartoum City
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Statistical analysis of the removal of Chromium(VI)by Iron Oxide Nanoparticle (Fe3O4)
...Show More Authors

Investigation of the adsorption of Chromium (VI) on Fe3O4 is carried out using batch scale experiments according to statistical design using a software program minitab17 (Box-Behnken design). Experiments were carried out as per Box-Behnken design with four input parameters such as pH (2-8), initial concentration (50–150mg/L), adsorbent dosage (0.05–0.3 g) and time of adsorption (10–60min). The better conditions were showed at pH: 2; contact time: 60 min; chromium concentration: 50 mg/L and magnetite dosage: 0.3 g for maximum Chromium (VI) removal of (98.95%) with an error of 1.08%. The three models (Freundlich, Langmuir, and Temkin) were fitted to experimental data, Langmuir isotherm has bette

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 02 2020
Journal Name
1st International Conference In Physical Science And Advance Materials
Structural and Morphological Characteristics of Organic and Inorganic Blend Heterojunction NiPcTs/Cd
...Show More Authors

In the present study NiPcTs, CdS thin films, and Blends of NiPcTs:CdS were prepared with 1:2 content mixing ratio of NiPcTs to CdS solutions. Cadmium chloride and thiourea were used as the essential materials for deposition CdS thin films while using organic powder of NiPcTs to deposit NiPcTs nanostructure films. The spin-coating technique was employed to fabricate the NiPcTs , CdS films and NiPcTs-CdS blend. Structural properties of films have been investigated via X-Ray diffraction(XRD),and show that thin films of NiPcTs, and CdS have monoclinic and polycrystalline hexagonal structure respectively while the blend has two polycrystalline structure with cubic and hexagonal phases. Atomic force microscope (AFM) confirmed that the surf

... Show More
View Publication