Preferred Language
Articles
/
5BaBeIkBVTCNdQwCqonu
Analogy-based Common-Sense Knowledge for Opinion-Target Identification and Aggregation
...Show More Authors

The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Women’s Knowledge about Health Promotion after Cesarean Delivery at Maternity and Pediatric Hospital in Al-Samawa City
...Show More Authors

Objective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income. Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indication or

... Show More
Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
International Medical Journal
Knowledge and Attitude of Iraqi Dentists towards the Use of Cone Beam Computed Tomography in Endodontics: A Questionnaire Study
...Show More Authors

Objective: The aim of this study was to assess the knowledge and attitude of Iraqi dentists towards cone beam computed tomography (CBCT) applications in endodontics by using an online survey. Materials and Methods: A questionnaire, consisting of 31 questions, targeted general dental practitioners and specialists in different dental specialities. A total of 306 participants were included. Data were assessed according to the frequency of distribution and the chi-square test was applied to analyse the difference in responses between two independent groups. Results: Among the participants 63.4% were using digital radiography in their daily practice, and 84% had awareness about CBCT's uses, with higher statistically significant responses among e

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of pregnant women’s knowledge and practices concerning prenatal care who attend primary health care centers in Baghdad City
...Show More Authors

Objective: To assess knowledge of pregnant women concerning prenatal care who attend primary health care
center in Baghdad city.
Methodology: A descriptive analytic study carried on (100) pregnant women who attend primary health care
centers in Baghdad city (50) of them from Al- Sheik Omer primary health care center \Resafa sector .and 50 from
Belat Al-Shuhadaa/ Al Karch sector, during the period from April to November 2011. The data were collected
through interview and use questionnaire format. Validity and Reliability of the questionnaire were determined
through panel of experts and pilot study, data were analysed through the application of descriptive statistical
analysis and inferential statistical analysis.
R

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Knowledge, attitude and practice of Iraqi mothers towards Vitamin D supplementation to their infants in Baghdad Al -Rusafa 2016
...Show More Authors

Background: Routine supplementation of vitamin D to infants is justifiable since vitamin D deficiency, and its consequences are highly prevalent not only in developing countries but worldwide. Maintaining a normal level of vitamin D is crucial in order to have a normal skeletal, as well as, extra-skeletal health. Knowledge of mothers regarding importance of vitamin D supplementation affect the health of their babies in a positive manner if accompanied by appropriate practice.

Objective: To determine the level of knowledge, attitude and practice of Iraqi mothers of under or equal 12 months old infants in Baghdad, AL-Rusafa, regarding vitamin D supplementation for their infants.

Typ

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Women’s Knowledge about Health Promotion after Cesarean Delivery at Maternity and Pediatric Hospital in Al-Samawa City
...Show More Authors

Objective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income.
Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indicat

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref