Preferred Language
Articles
/
KBYUU4cBVTCNdQwCkEWh
Novel Application of Platelet-Rich Fibrin as a Wound Healing Enhancement in Extraction Sockets of Patients Who Smoke
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Studying the Combination Effect of Additives and Micro Steel Fibers on Cracks of Self-Healing Concrete
...Show More Authors

In this study, the effect of the combination of micro steel fibers and additives (calcium hydroxide and sodium carbonate) on the size of cracks formation and healing them were investigated. This study aims to apply the use of self-healing phenomenon to repair cracks and to enhance the service life of the concrete structures. Micro steel fibers straight type were used in this research with 0.2% and 0.4% by volume of concrete. A weight of 20 and 30 kg/m3 of Ca(OH)2 and 2 and 3 kg/m3 of Na2CO3 were used as a partial cement replacement. The results confirm that the concrete cracks were significantly self-healed up to 30 days re-curing. Cracks width up to 0.2 mm were comp

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Taibah University Medical Sciences
Histological evaluation of the effects of bone morphogenetic protein 9 and angiopoietin 1 on bone healing
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Biochemical And Cellular Archives
Immunohistochemical evaluation of epidermal growth factor expression in skin wound treated by capparis spinosa flavonoid extract in alloxan induced diabetes rats
...Show More Authors

In diabetes, impaired wound healing and other tissue abnormalities are considered major concerns. Many factorsaffect the time and quality of wound healing. One of the purposes of medical sciences is wound healing in a short time withreduced side effects. The herbal products are more precious in both prophylaxis as well as curative in delayed diabetic woundhealing activity when compared to synthetic drugs.A wide range of evidence has shown that capers plant possesses differentbiological effects, including antioxidant, anticancer and antibacterial effects. Phytochemical analysis shows thatC. spinosahashigh quantities of bioactive constituents, including polyphenolic compounds, which are responsible for its health-promotingeffects. The healing

... Show More
Scopus (4)
Scopus
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Women's Self-care Instructions concerning Wound, Perineal & Urinary System Care post cesarean section in Baghdad teaching hospital
...Show More Authors

Aim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Kufa Journal For Veterinary Medical Sciences
Bacterial isolation from burn wound infections and studying their antimicrobial susceptibility
...Show More Authors

The present study was carried out to determine the bacterial isolates and study their antimicrobial susceptibility in case of burned wound infections. 70 burn wound swabs were taken from patients, who presented invasive burn wound infection from both sex and average age of 3-58 years, admitted to teaching medical Al- Kendi hospital from October 2007 to June 2008. Pseudomonas aeruginosa was found to be the most common isolate (48.9%) followed by Staphylococcus aureus (24.4%), Citrobacter braakii (13.3%), Enterobacter spp. (11.1%), Coagulase-negative Staphylococci (11.1%), Proteus vulgaris (6.66%), Corynebacterium spp. (6.66%), Micrococcus (6.66%), Proteus mirabilis (4.44%), Enterococcus faecalis (4.44%), E.coli (4.44%), Klebsiella spp. (2.22

... Show More
Preview PDF
Crossref (9)
Crossref