Preferred Language
Articles
/
bsj-7778
Delay differential equation of the 2nd order and it's an oscillation yardstick
...Show More Authors

This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

Scopus (13)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 24 2025
Journal Name
Plos One
Assessment of the bypass of obturation materials beyond fractured instruments after using different obturation techniques in simulated curved canals (An in-vitro study)
...Show More Authors

This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

View Publication
Scopus (13)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Reality Of Using Educational Technology In Teaching Mathematics From The Point Of View Of Mathematics Teachers In Amman
...Show More Authors

The study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Sun May 25 2025
Journal Name
Research Journal Of Chemistry And Environment
Resveratrol: An Outstanding Natural Compound With Broad Biomedical Applications
...Show More Authors

In 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref