Preferred Language
Articles
/
eReewpEBVTCNdQwCSJre
Prevalence of Orofacial Clefts: A Retrospective Crosssectional Analysis of Gynecology and Obstetrics Hospital Records in the City of Sulaimani, Kurdistan Region of Iraq
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force in relation to maximum mouth opening among primary school children
...Show More Authors

Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Creeds in Assyrian Sculpture: جبــــــــــار محمـــــــــــــود حسين العــــــبيدي-حسام عبد الخالق عثمان الطائي
...Show More Authors

The research covered Creeds in Assyrian Sculpture

 (Assyrian Sculptures) The ability of the Assyrian sculptor to

 contrast these creeds and tendon in Assyrian sculpture, in various variations, including prominent and stereotypical plaques and winged bulls, in addition to the obelisks and hunting scenes of the Lionسion hunting scenes of the black                                                               

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Cloud platform functionality in visual media: علي صباح سلمان-ثائر علي جبر الله
...Show More Authors

The rapid changes in the field of transferring and exchanging information via cloud platforms have revolutionized the field of modern visual media, as cloud computing technology has greatly influenced the media institutions, providing effort, money and high-quality materials. The research included five chapters, the first came under the methodological framework for the research and the second Theoretical framework, the first two included the concept of cloud computing and the second platforms for cloud computing in the visual media and the third chapter Research procedures and the fourth chapter The sample analysis and the fifth chapter The research results were the most prominent
1. The cloud service made the benefit beyond the typic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 14 2019
Journal Name
Turkish Journal Of Biology
E2F6 is essential for cell viability in breast cancer cells during replication stress
...Show More Authors

Abstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 27 2021
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
Artistic expression in diagnosing behavioral disorders for elementary school students an applied study
...Show More Authors

The interest in art for young ages is seen as an obvious breakthrough and as revealing of psychological and health feelings in addition to emotions, and it is a treatment for those who suffer from behavioral disorders. The problem arose with the following question: What is the role of artistic expression in diagnosing behavioral disorders for primary school pupils? The aim of the research is to detect the behavioral disorders in the artistic expression of the female students' paintings from the teachers' point of view. The descriptive analytical approach was adopted as it is the appropriate method for identifying and estimating the characteristics and features related to people, places and things, and analyzing situations or phenomena as a

... Show More
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Nodes In Transport Networks – Research, Data Analysis And Modelling
Suggested Solutions to Reduce Traffic Congestion During Rush Hours in Al-Jadriya Intersection
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Creating Through Points in Linear Function with Parabolic Blends Path by Optimization Method
...Show More Authors

The linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref