Preferred Language
Articles
/
ZhZJSokBVTCNdQwCwoi6
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Sun Jul 31 2022
Journal Name
Pakistan Journal Of Medical & Health Sciences
Application of program for nurse’s management about care of children treated with Ventricular Peritoneal Shunt
...Show More Authors

Publication Date
Sun Jul 02 2023
Journal Name
Journal Of Pakistan Association Of Dermatologists
Acute cutaneous side effects of radiotherapy in patients with pelvic cancer: Frequency, severity and risk factors estimation
...Show More Authors

Background  Radiotherapy is one of the main modalities in the management of cancer along with chemotherapy and surgery. Despite its great benefit it has many side effects on many systems and organs including the skin.   Objective To record the frequency, grades and types of acute cutaneous side effect in patients with pelvic tumors treated with radiotherapy, in order to report the risk factors and to find appropriate strategies for prevention and management. Patient and methods.   Methods A prospective observational study was carried out in Baghdad Radiation and Nuclear Medicine Centre between August 2020 and August 2021.A total 70 patients were enrolled in this study.All patients had full history and full baseline skin exam and were ass

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Jul 08 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Estimation of Superoxide Dismutase, Matrix-metalloprotinase-9, and Interleukin -18 in Patients with Type Two Diabetes Mellitus
...Show More Authors

Antioxidant status imbalance and inflammatory process are cooperative events involved in type 2 diabetes mellitus. This study aimed to investigate     superoxide dismutase as a potential biomarkers of antioxidant imbalance, matrix-metaloprotinase-9,   and interleukin -18  as biomarkers of inflammation in serum and to estimate  the effects of other confounding factors  gender, age and finally measuring the relation among the interested biomarkers.

This case - control study included 50 patients,   and   45 of  healthy subjects matched age –gender were also enrolled  in this study as a control group.    The   focused &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Research Journal Of Pharmacy And Technology
Estimation of Alkaline Phosphatase level in the Serum and Saliva of Hypothyroid Patients with and without Periodontitis
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref