Preferred Language
Articles
/
FBf025IBVTCNdQwC1sKy
Effect of a Nutritional Education Program on Mother Knowledge Regarding Their Children Nutritional Status
...Show More Authors

Scopus
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Molecular Structure
Asymmetric 1,3,4-thiadiazole derivatives: Synthesis, characterization and studying their liquid crystalline properties
...Show More Authors

View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Prohibitions Related to Food and Drinks and Their Retribution in the Torah
...Show More Authors

Summary

   

 Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.

      The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics.  The Torah specified all these laws with several texts

View Publication Preview PDF
Publication Date
Sat Dec 10 2022
Journal Name
المجلة العراقية لعلوم التربة
ACTINOMYCETES GENERAL CHARACTERISTICS AND THEIR ROLE IN SOIL, PLANT, AND HUMAN *HEALTH
...Show More Authors

Actinomycetes are free, spore-forming, high (G+C) ratio (>55%) saprophytic microorganisms that are widely distributed in most soils, colonize plants, and are prevalent in water. This is frequently accompanied by the production of filament airborne mycelium. Actinomycetes are well-known microcolonies for creating antibiotics and other critical bioactive components that are beneficial to humans. Approximately 70% to 80% of commercially available medications and antiviral active compounds have been synthesized so far. Secondary metabolites produced by microbes have the potential to be used in a variety of sectors, including antimicrobial agents, enzyme technology, pigment manufacture, antitumor agents against cancer cells, and toxin pr

... Show More
Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Copper Nanoparticles Synthesized in Biopolymer Matrix and Their Application in Antibacterial Activity
...Show More Authors

Copper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus