
Mohammed Jasim Mohammed- Macquarie University
Mohammed Jasim Mohammed
- Macquarie University
About
17
Publications
1,679
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Current institution
Publications
Publications (17)
Background: Unmanned Aerial Vehicles (UAVs) can potentially transform several sectors, notably last-mile delivery. Despite its potential, their implementation in real-world situations, particularly in severe weather like rain, must be improved with route optimisation and stability issues. Objective: This study aims to provide a fresh approach to th...
Background
Type 2 diabetes is a condition in which the body becomes resistant to the effects of insulin, leading to reduced insulin production in the pancreas. It has genetic- and family-related risk factors that cannot be changed, along with modifiable lifestyle factors. The precise genetic causes of type 2 diabetes are still unknown. However, ind...
Background: Burning mouth syndrome (BMS), halitosis, and hyposalivation are common oral problems in type 2 diabetic patients with no obvious oral lesions. age, sex, salivary zinc, leptin, adiponectin, lipids, BMI, and duration of diabetes affect the growth of oral Candida spp with subsequent development of Burning Mouth Syndrome, halitosis, and hyp...
Background: The shift from 4G LTE to 5G networks represents a substantial advancement in wireless communication technology, providing improved data transfer rates, decreased response time, and heightened connectedness. Nevertheless, there are significant worries surrounding the cybersecurity of these sophisticated networks. Objective: The objective...
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to se...
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availabili...
In this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be dete...
In this paper, a mathematical model was built for the supply chain to reduce production, inventory, and transportation in Baghdad Company for Soft Drink. The linear programming method was used to solve this mathematical model. We reduced the cost of production by reduced the daily work hours, the company do not need the overtime hours to work at th...
Breast cancer becomes a major threat to female health, many reports refer to a high inci-dence of breast cancer in Iraq; especially, in the last years. The micro RNA-370 molecules have not been reported in Iraqi cancer patients. Our objective in this study was to identify the expression of micro RNA-370 molecules in breast cancer patients as an ear...
Purpose: Providing practical knowledge of the requirements of a detailed feasibility study for selecting the investment project. Findings: Directing the private sector towards investing in productive projects - the pre-cast reinforced concrete project - as it achieves a financial return as well as providing Providing foreign currencies by reducing...
The purpose of the study is to identify the need to improve health services in Iraq by determining the efficiency of service in health care centres and working on exploiting limited resources through choosing the most efficient technological art represented by using precast concrete technology to fill the shortfall in the establishment health centr...
Breast cancer conceder the higher tumor rate among Iraqi women. New potential and prognostic markers are required to identify those women. PTEN gene (phosphatase and tensin homolog deleted from chromosome 10) is tumor suppressor; its mutations in breast cancer are well reported in many populations but not in the Iraqi people. The main purpose of th...
The research aims to prepare a preliminary feasibility study that shows the importance of preliminary feasibility study in investment decision making, carrying out of the local demand of service provided in accordance with international standards and statement of investment opportunities available to the private sector in several investment methods...
Static power dissipation is one of the most important problems that impedes the progress of electronic circuits so it must be reduced. CMOS OP-AMP using Self-biased technique is designed and improved to be less consumption power. Moreover, Particle Swarm Optimization (PSO) algorithm is used in this paper to deal with Static power dissipation . The...