Preferred Language
Articles
/
ABbRrooBVTCNdQwCP6P7
Dynamic analysis of a harvested fractional-order biological system with its discretization
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Posttraumatic cognitions and its Relationship with Posttraumatic Stress Disorder of Traumatized Individuals
...Show More Authors

Symptoms of posttraumatic stress disorder are associated with various variables such as the exposure to traumatic events, sex and age. Such events could lead to negative cognitions towards self and the world. These cognitions, in turn, may lead to traumatic related disorders.

The present study aims to identify the percentage of traumatised individuals according to sex and age category variables. It also aims to assess the average of spreading symptoms of posttraumatic stress disorder of traumatised individuals according to sex and age category variables. Likewise, it aims to test variables significance in cognitions towards the world and the self according to the level of the spread of posttraumatic stre

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Physical Education
Leadership Behaviour and Its Relation With Active Communication Skills Of Soccer Coaches
...Show More Authors

View Publication
Publication Date
Sun Feb 02 2025
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Morphometric Evaluation of Lips in Iraqi Subjects with its Possible Esthetic Benefits
...Show More Authors

Objectives: to assess the normal range of different lip parameters with gender difference and its role in esthetic procedures for Iraqi people. Methods: direct lip measurements were performed with closed lip position using a digital vernier caliper in 132 young Iraqi subjects (89 female and 43 male). Results: Lip measurements showed sexual dimorphism with higher value in men than women in six parameters. Cutaneous height of the upper lip was higher in both sexes. The mustache area in males was longer in males compared to females.  Also, it was noticed that upper lip vertical thickness had a higher value, especially in subjects with cosmetic procedures. In addition to that, vertical upper lip thickness showed a higher rise in values

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Level of uric acid and its, relationship with lipid peroxidation in sera of patients with acute coronary syndrome
...Show More Authors

Unstable angina pectoris often leads to acute myocardial infarction. Since uric acid is thought to be risk factor for cardiovascular disease and considered a major antioxidant in human blood .The level of uric acid and lipid peroxidation in the sera of patients with unstable angina and myocardial infarction were measured and compared to the healthy individuals. Twenty-nine patients with unstable angina and twenty-nine patients with myocardial infarction were studied and compared to twenty-five healthy individuals. Uric acid was measured by using Human Kit. Malondialdelyde (MDA) a lipid peroxidation marker, was measured by thiobarbituric acid method .Significant elevation of uric acid and MDA were observed in the sera of pati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (9)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref