Preferred Language
Articles
/
VRZSqYcBVTCNdQwCcFoB
Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students
...Show More Authors

Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Vitamin E and Q10 Supplementation against Doxorubicin-Induced Neurotoxicity in Rats
...Show More Authors

View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical Expressions of AKT, ATM and Cyclin E in Oral Squamous Cell Carcinoma
...Show More Authors

Background: Understanding the pathogenesis and molecular basis of Oral Squamous Cell Carcinoma (OSCC) has increased rapidly over the past few years that is essential to improve patient's prognosis and treatment modalities. The purpose of this study to evaluate the Immunohistochemical expressions of AKT, ATM, AND Cyclin E in oral squamous cell carcinoma Materials and methods: This study was performed on a forty formalin-fixed paraffin-embedded blocks which histopathologically diagnosed as Oral Squamous Cell Carcinoma. All cases were collected from the Histopathological Laboratory from patients treated surgically at Maxillofacial surgery Department at Ramadi Teaching Hospital, Iraq. Results: The immunohistochemical staining of AKT showed pos

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 02 2018
Journal Name
Journal Of Language Studies
Activating Functional Formulas of EFL Learners` Fluency and Accuracy Skills at the College of Education for Human Sciences (Ibn Rushd)
...Show More Authors

The paper investigates the frequency and the impact ofusing Functional formulas in EFL students` fluency and accuracyused in English teaching in College of Education for HumanSciences (Ibn Rushd), English Department. This study aims atfinding out the frequency of formulaic sequences’ in students`fluency- accuracy skills, whether or not the student differences inthe functional formulas in fluency- accuracy competences ,andinvestigating differences in types formulaic sequences in fluencyaccuracyskills. The instruments are (observation and essay writing)used in investigating the fluency through using observation whereasin accuracy using essay testing. With 100 functional formulas, oneighty students second year at English Department.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Determining the grades and standard levels of some mental skills as an indicator for the selection of young volleyball players
...Show More Authors

ABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref