Preferred Language
Articles
/
ORYgYocBVTCNdQwCVkkd
Retreatment Efficacy of Continuous Rotation Versus Reciprocation Kinematic Movements in Removing Gutta-Percha with Calcium Silicate-Based Sealer: SEM Study
...Show More Authors

Retreatment Efficacy of Continuous Rotation Versus Reciprocation Kinematic Movements in Removing Gutta-Percha with Calcium Silicate-Based Sealer: SEM Study, Raghad Noori Nawaf*, Ra

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Hyperprolactenemia in Women with Systemic Lupus Erythematusus
...Show More Authors

Recent accumulated evidences suggest that prolactin is an important immunomodulator and may have a role in the pathogenesis of systemic lupus erythematosus (SLE). The aim of this study was to assess the frequency of hyperprolactinemia in women with SLE and to evaluate its correlation with disease flares. Serum prolactin levels were measured in 62 women with SLE and 50 age- and sex-matched healthy controls. In patients and control groups prolactin levels were determined by immunoradiometric assay (IRMA). The prolactin level was found to be higher than normal rang in (40.3%) of SLE patients in active stage versus only (8.06%) of the same SLE patients but in the inactive stage and in (4%) of control group, the elevation was ranging between mi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Transportation movement with containers in Iraqi harbors
...Show More Authors

The use of containers in transportation leads to the reduction in time and effort of the process of loading and unloading of goods as well as protecting the goods from damage and breakage and to reduce the financial costs.
. This development has led also to make changes in the sizes and capacity of ships, therefore changes in the ports must be taken place where they must be provided with an appropriate depth for such vessels, that means the increase in the depth of ports and the establishment of wide storage yards and to provide appropriate mechanisms for handling process.
In this study, the researcher has dealt with this type of transport business in Iraqi ports, namely:
1- Khur Al-Zubair port.
2- Um Qaser port.
In order

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 03 2014
Journal Name
Iraqi Journal Of Science
Antineutrophil cytoplasmic antibodies in patients with tuberculosis
...Show More Authors

Tuberculosis is caused by Mycobacterium tuberculosis; it is considered as one of the most common, infectious diseases and major causes of morbidity and mortality worldwide. A prospective study was conducted to obtain more clarification about the impact of causative agent and its treatment to enhance autoantibodies production such as ANCA and BPI which used as diagnostic markers for several diseases, and to provide further insight into the classical risk factors (age and sex).Seventy patients with tuberculosis involved in this study, 35 of them were untreated and 35 with treatment administration these patients were attending to directorate of general health national reference laboratory in Baghdad during the period between November/ 2012 and

... Show More
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication