Preferred Language
Articles
/
6BfS8pIBVTCNdQwCdsMy
Music Medicine Intervention--Based Program for Reducing Pain and Anxiety of Children Undergoing Bone Marrow Aspiration and Lumber Puncture Procedures
...Show More Authors

Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Aneurysmal bone cyst of the lateral end of clavicle in a twelfth year old girl Case study
...Show More Authors

Introduction: An aneurysmal bone cyst are enigmatic lesionof unknown cause and presentation and are difficult todistinguish from other lesions, it is a benign, but expansibletumor like lesion that generally occurs in the long bones. Ananeurysmal bone cyst arising from the flat bone like clavicleis rare .Case presentation: We report a 12-year-old girl child with ananeurysmal bone cyst of the lateral third of left clavicletreated with enblock resection. The pathologic findingsconfirmed the diagnosis of aneurysmal bone cyst. Thepatient has been followed up for one year with no evidenceof recurrence .Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.

View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Program in Developing Awareness of the Criteria for Judging Electronic Educational Materials Among Students of Teaching Diploma at Dhofar University
...Show More Authors

The study aims to develop the awareness of the criteria for judging electronic educational materials among students of educational qualification at Dhofar University over spreading the Corona pandemic through a program based on mini-educational units. The study was applied to (18) students studying Teaching diploma at Dhofar University for the academic year 2020-2021, and their number. They were chosen intentionally. The study resulted in reaching a list of criteria for judging electronic educational materials, roughly (18) criteria in the selection themes and (15) criteria in the use theme. The level of awareness of the sample members with the criteria for selecting and using electronic educational materials and the effectiveness of the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربوية والنفسية
The effect of a training program for chemistry teachers on matching both sides of the brain together on the academic achievement of their students
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Nov 27 2018
Journal Name
The Iraqi Geological Journal
CHRONOSTRATIGRAPHICALLY BASED RESERVOIR MODEL FOR CENOMANIAN CARBONATES, SOUTHEASTERN IRAQ OILFIELDS
...Show More Authors

The Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref