Preferred Language
Articles
/
VhZx1YoBVTCNdQwC0qaP
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Detection of Parvovirus B19 DNA in pregnant Sudanese women attending The Military hospital using Nested PCR technique : Detection of Parvovirus B19 DNA in pregnant Sudanese women
...Show More Authors

Background: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.  

Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.

Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Feb 04 2025
Journal Name
Microbes And Infectious Diseases
A preclinical evaluation of the response of repairing the DNA of MCF7 breast cancer cells after exposure to probiotic bacteria
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Kirkuk University Journal
DNA Sequences of qacE∆1 gene in Pseudomonas aeruginosa isolated from wounds and burns infections.
...Show More Authors

Publication Date
Sat Dec 21 2024
Journal Name
Gastroenterology
Evaluation of global DNA methylation, homocysteine and vitamin B12 levels among patients with celiac disease
...Show More Authors

Celiac disease (CD) is an immune-mediated disorder caused by gluten in genetically susceptible individuals characterized by chronic inflammation that essentially affects the small intestine. Objective: this study was designed to measure the potential role of some serological biomarkers including vitamin B12 and homocysteine (HCY) in the progression of CD as well as their relations to global DNA methylation (5mC). Materials and methods. Forty CD patients were enrolled in the study with an average age of (36.60 ± 2.03) years (range between 15 and 60). The diagnosis of the disease was confirmed by serological examinations and intestinal endoscopy in Gastroenterology and Liver Teaching Hospital in the Medical City Hospital in Baghdad

... Show More
View Publication
Scopus (8)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 15 2025
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Biological Activity and Antioxidant Studies of New Metal Ion Complexes Based on (E)-4-((benzo[d]thiazol-2-ylimino)methyl)-1,5-dimethyl-2-phenylpyrazolidin-3-one
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
Structural elements of composition design for fabrics image Image footage model
...Show More Authors

End of the twentieth century witnessed by the technological evolution Convergences between the visual arts aesthetic value and objective representation of the image in the composition of the design of the fabric of new insights and unconventional potential in atypical employment. It is through access to the designs of modern fabrics that address the employment picture footage included several scenes footage from the film, which focuses on research and analytical as a study to demonstrate the elements of the picture and the organization of its rules and how to functioning in the design of fabrics, Thus, it has identified the problem by asking the following: What are the elements of the picture footage and how the functioning of the struct

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Fri Oct 31 2025
Journal Name
The Iraqi Geological Journal
Improving Carbonate Reservoir Development Decision: A Study of Controlling Factors Based on Geological and Engineering Objectives, Halfaya Oil Field
...Show More Authors

Detecting the optimum layer for well placement, which requires a diverse assortment of tools and techniques, represents a significant challenge in petroleum studies due to its critical impact on minimizing drilling costs and time. This study aims to evaluate integrated geological, petrophysical, seismic, and geomechanical data to identify the optimum zones for well placement. Three different reservoirs were analyzed to account for lateral and vertical variations in reservoir properties. The integrated data from these reservoirs provides many tools for reservoir development, especially to detect appropriate well placement zones based on evaluations of reservoir and geomechanical quality. The Mechanical Earth Model (MEM) was construct

... Show More
View Publication
Scopus Crossref