Preferred Language
Articles
/
AxYnCowBVTCNdQwCPffe
Evaluation of the performance of introduced varieties of maize under different planting dates and environments
...Show More Authors

Scopus
Publication Date
Sat Apr 06 2024
Journal Name
Al- Anbar Medical Journal
Metastatic Ovarian Tumor from Incidental Renal Cell Carcinoma: A Case Report and Literature Review
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Biologically synthesized Copper Nanoparticles from S. epidermidis on resistant S. aureus and cytotoxic assay
...Show More Authors

The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Anti-Corrosive Substance as Green Inhibitor for Carbon Steel in Saline and Acidic Media
...Show More Authors

Ficus (FIC) leaf extract used as corrosion inhibitor for carbon steel alloy (C.S) in two corrosive environments (saline and acidic) with four concentrations (1, 2, 3 and 4 ppm) at varied temperature range between (298-328 K) using electrochemical polarization measurements. The importance of this work focused on the use the green chemistry that is far from the chemical materials effect. The results of polarization presented the FIC inhibitor consider a mixed type (anodic and cathodic) inhibitor. Tafel curve used to evaluate the corrosion inhibition activity. In a saline medium, the best inhibitor efficiency reaches to (87%) in 2 ppm and IE% reach to (99%) for HCl medium inhibited by 1ppm. Langmuir isotherm obeys the study by thermodynamic pa

... Show More
View Publication
Scopus (27)
Crossref (15)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Aug 31 2025
Journal Name
Journal Of Science In Medicine And Life
Serum Endothelial Specific Molecule 1(EMS 1) and Uric Acid Levels in Severe Preeclampsia
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Energy Science And Engineering
CFD analysis on optimizing the annular fin parameters toward an improved storage response in a triple‐tube containment system
...Show More Authors

Scopus (21)
Crossref (18)
Scopus Clarivate Crossref