Baghdad, Iraq
Baghdad, Iraq

The Iraqi University offers bachelor's and graduate university degrees. It is located in the Adhamiyah district of Baghdad, Iraq. It was founded in 1989 and was formerly named the Islamic University. In 2010, the university council recommended that the name be changed to Iraqi University.The university accepts students from all over the Islamic world.The Ministry of Higher Education and Scientific Research says that the university celebrate science and knowledge in Iraq. The Iraqi University offers degrees in science, humanities, applied medicine, engineering, media and arts, law, education, and other subjects. Wikipedia.

Time filter
Source Type

Sahib H.B.,Nahrain University | Al-Zubaidy A.A.,Nahrain University | Hussain S.M.,Iraqi University | Jassim G.A.,University of Baghdad
International Journal of Pharmacy and Pharmaceutical Sciences | Year: 2014

Objective: This study aimed to investigate the possible anti angiogenic activity of Vitex agnus castus leaves extracts Methods: The leaves were dried and grounded into fine powder, and extracted sequentially with Chloroform, methanol and water. Ex-vivo rat aorta anti angiogenic assay was used to identify the most anti angiogenic extract, active extract has been chosen for dose response testing, by preparing serial concentrations of that extract and applied on aorta rings of the rat, the active extract was tested on human umbilical ventricular endothelial cell line as in vitro assay. Free radical scavenging activity has been tested by 1,1-Diphenyl-2-picrylhydrazyl (DPPH) to discover which extract has the highest free radical scavenging activity and as a mean to elucidate the possible mechanism of extract action. Results: Methanol extract has the highest percentage of blood vessels growth inhibition in comparison to other extracts P< 0. 05. However, there were no significant differences between chloroform and water extract P> 0. 05. Methanol extract showed dose dependant inhibitory activity on rat aorta assay the IC50 was (21.73 μg/ml). Methanol extract showed dose response activity against human umbilical ventricular endothelial cells (HUVEC) and IC50 was (42.09μg/ml). Methanol extract of Vitex agnus castus leaves showed the most potent free radical scavenging activity in comparison to other extracts; IC50 was (126.79μg/ml). Conclusion: The results showed that methanol extract of Vitex agnus castus has potential anti angiogenic activity and this activity may be due to the high activity in free radical scavenging capability.

Yeremenko O.,Kharkov National University of Radio Electronics | Nevzorova O.,Kharkov National University of Radio Electronics | Ali A.S.,Iraqi University
2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings | Year: 2017

In this paper for the first time the mathematical model and the two-level method of fault-tolerant inter-domain routing in telecommunications networks was presented. The novelty of the model is its decomposed representation and formulation the inter-area interworking conditions. The implementation of these conditions guaranteed the connectivity of calculated inter-area paths. The research of the proposed method of hierarchical routing showed that on increase of the number of coordinating iterations is affect the network load, if it was accompanied by the implementation of multipath routing strategy, as well as increasing the number of border routers. © 2017 IEEE.

Alzand A.A.,Iraqi University
Proceedings of the International Conference on Industrial Engineering and Operations Management | Year: 2017

Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her. The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff. You can identify three main dimensions of the target of various information in security systems, (I)definition: who is allowed to enter the system Must check it out through three main entrances (II)dependence: once you learn the rules of the real user, the natural next question is what allowed for thisperson Thus, an accreditation process based access to resources for this user (iii) Management:representing management saving the user attributes, in addition to the security of a given resourcedefinition. It includes on activities such as the exclusion of the advantages of the arrival of the user oremployee leaving the service. The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information). Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software. © IEOM Society International.

Ali A.S.,Iraqi University
2015 2nd International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2015 - Conference Proceedings | Year: 2015

In this paper was developed a dynamic model of multipath routing based on balancing lengths of queues at the routers of telecommunication network represented by a system of linear differential equations of queue buffer utilization. The novelty of represented model is a modification of the conditions of balancing lengths of queues to take into account the priorities and lengths of packets in queues. Proposed model allowed to convert the solution of multipath routing based on balancing lengths of queues to solution of problem of optimal control. Using the solution proposed allows to organize a more effective control of buffer and link network resources due to the consistent solving of multipath routing and balancing lengths of queues problems in accordance with the concept Traffic Engineering Queues. © 2015 Kharkiv National University of Radioelectronics.

Abdulwahd M.N.,Iraqi University
2015 2nd International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2015 - Conference Proceedings | Year: 2015

Solution of actual scientific and practical problem associated with the development of flow-based model of multipath routing with traffic policing rejection balancing was presented. Within the proposed model consistent solution of problem of multipath routing with traffic policing rejection balancing converged to solution of optimization problem of linear programming with the optimality criterion as minimum of dynamically managed upper bound of rejections for all flows in a whole network. Numerical examples of multipath routing with traffic policing rejection balancing problem solving confirmed the adequacy and effectiveness of the proposed solution. Investigation of processes of multipath routing with traffic policing rejection balancing using the proposed model showed that the flow rate restriction on the network edge has an adaptive nature. © 2015 Kharkiv National University of Radioelectronics.

Lebedenko T.N.,Kharkov National University of Radio Electronics | Simonenko A.V.,University of Kharkiv | Arif F.A.R.,Iraqi University
Modern Problems of Radio Engineering, Telecommunications and Computer Science, Proceedings of the 13th International Conference on TCSET 2016 | Year: 2016

The paper presents the flow-based queue management model on telecommunication networks routers based on optimal flow aggregation and packets distribution in queues. The novelty of the model is that with flows distribution in queues it is carried out its aggregation based on flows and queues classes comparison within the analysis of the set of classification indicators. © 2016 National University Lviv Polytechnic.

Nevzorova O.,Kharkov National University of Radio Electronics | Arous K.M.,Kharkov National University of Radio Electronics | Ali A.S.,Iraqi University
Modern Problems of Radio Engineering, Telecommunications and Computer Science, Proceedings of the 13th International Conference on TCSET 2016 | Year: 2016

To improve scalability of multicast routing solutions the method of hierarchical routing with coordination was proposed. It is based on the decomposition representation of the flow-based model of multicast routing. The usage of this method allowed decentralizing the calculation of the multicast routes in the border routers of telecommunication networks. © 2016 National University Lviv Polytechnic.

Adham A.M.,Iraqi University
International Review of Mechanical Engineering | Year: 2013

In this paper, the optimization of a nanofluid-cooled microchannel heat sink was reported. Al2O3-NH3 with three different volume fractions (1 %, 3 % and 5 %) was examined. An optimization scheme which is comprised of two objective functions (thermal resistance and pumping power) and the elitist non-dominated sorting genetic algorithm (NSGA-II) was employed to optimize the overall performance of the considered system. Under the same operating conditions, the ammonia-base nanofluid (Al2O3-NH3) exceeded other coolants (Al2O3-H2O and H2O) in terms of the required pumping power (0.144, 1.015 and 0.94 W for Al2O3-NH3, Al2O3-H2O and H2O, respectively). When the refrigerant base nanofluid is used as a cooling fluid, a lighter heat sink was produced. Finally, more studies should be dedicated to explore this nanofluid and the possibility of considering it for electronic systems cooling. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

Thamer N.A.,Iraqi University | Almashhedy L.A.,University of Babylon
International Journal of Pharma and Bio Sciences | Year: 2014

Green chemistry means utilization of various plant resources for the synthesis of metallic nanoparticles. In the present study silver nanoparticles was synthesized in a single step by a green biosynthetic method using an extract of Crocus Sativus L act as a reducing and capping agents. The nanoparticles were characterized usingUV-Vis, Xray diffraction (XRD) and Dynamic light scattering (DLS) .The prepared silver nanoparticles(AgNPs) showed surface Plasmon resonance centered at 440 nm. The XRD pattern showed the face centered cubic structure of silver nanoparticles. The size rangefrom19.9nm to 28.1nm was determined by using laser particle size analyzer. The current research work investigates the findings of optimization of different experimental variable conditions like time,temperature,reaction pH, silver nitrate concentration and the mixing ratio of the reactants on silver nanoparticles synthesized. The optimized condition for the synthesis of silver nanoparticles revealed that silver nitrate concentration was 1 mM, temperature was70°C, PH was 9, incubation time 1 h and aqueous extract and silver nitrate ratio was 5:95.

Alzand A.A.,Iraqi University | Ibrahim R.,University Tun Hussein Onn Malaysia
IEOM 2015 - 5th International Conference on Industrial Engineering and Operations Management, Proceeding | Year: 2015

Arabic language is a unique language because of its pronunciation of the word written. The formation of more than two Arabic letters will translate to a different meaning. This paper presents an alternative translator from Arabic word to English word by using an equation for the formation of the Arabic letters. The morphological model of Arabic language is used in order to use the equation to put diacritics according to Arabic grammatical rules. A system is then developed based on the morphological model. The input of the system is the Arabic word. The system uses morphological Arabic Natural Language Processing (ANLP) and translates the Arabic word into English word. The output of the system shows percentage of the successful translated words. We tested our system by using 11 Arabic words. The results show that 9 out of 11 Arabic words (81.81%) were successfully translated by conducting the process of diacritics in the morphological model of Arabic language. We also perform a quality assessment to calculate the efficiency and effectiveness metrics based on the ANLP developed. Based on the result, the system can be used as an alternative translator from Arabic word to English word. © 2015 IEEE.

Loading Iraqi University collaborators
Loading Iraqi University collaborators