Preferred Language
Articles
/
bijps-1280
An Overview of Some Plant Based Products With Hepatoprotective Activity
...Show More Authors

In folk medicine there are various medicinal amalgamation possessing hepatoprotective activity. This activity is of significance because several toxins cause liver injury. Hence, many pharmaceutical companies are targeting herbal medicines for the treatment of liver abnormalities and towards evolving a safe and effective formulation with desired route of administration. In current review we have focused on the studies showing hepatoprotective effect using marine compounds and plant derived compounds. Liver disorder, a global health problem, usually include acute or chronic hepatitis, heptoses, and cirrhosis. It may be due to toxic chemicals and certain antibiotics. Uncontrolled consumption of alcohol also affects liver in an unhealthy way. To cure liver disorders several formulations of medicinal plants are being used. It is observed that hepatoprotective effect of plant is mostly due to flavonoids, alkaloids, terpenoids, steroids, and glycoside. A single drug cannot be useful for all the types of liver disorders. Several plant extracts for liver illness results from poisonous chemicals, viruses, extra alcohol consumption, and repeated administration of medication. By using standards of protection and efficacy, manufacture of plant products need to be ruled out. Current review provides an understanding of ethnopharmocology, toxicology of several medicinal plants manifesting hepatoprotective potential. Despite of varied database analysis new discoveries and their probabilities, evidences on viral hepatitis treatment or liver cirrhosis is inadequate.  Further information about phytotherapy, toxicology, quality control studies shall be endorsed. Further in depth studies are required to discover quality trait like SAR, MOA, safety and toxicity and therapeutic potential of phytoconstituents in clinical settings.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Jun 15 2023
Journal Name
International Journal On Engineering, Science And Technology
EEG Neuro-markers to Enhance BCI-based Stroke Patients Rehabilitation
...Show More Authors

Stroke is the second largest cause of death worldwide and one of the most common causes of disability. However, several approaches have been proposed to deal with stroke patient rehabilitation like robotic devices and virtual reality systems, researchers have found that the brain-computer interfaces (BCI) approaches can provide better results. In this study, the electroencephalography (EEG) dataset from post-stroke patients were investigated to identify the effects of the motor imagery (MI)-based BCI therapy by investigating sensorimotor areas using frequency and time-domain features and to select particular methods that help in enhancing the MI-based BCI systems for stroke patients using EEG signal processing. Therefore, to detect

... Show More
View Publication
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Tue Nov 27 2018
Journal Name
The Iraqi Geological Journal
CHRONOSTRATIGRAPHICALLY BASED RESERVOIR MODEL FOR CENOMANIAN CARBONATES, SOUTHEASTERN IRAQ OILFIELDS
...Show More Authors

The Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref