Preferred Language
Articles
/
lxc6Po4BVTCNdQwC3j4X
A Comparative Study for String Metrics and the Feasibility of Joining them as Combined Text Similarity Measures
...Show More Authors

Crossref
View Publication
Publication Date
Mon Mar 04 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
A comparative immunohistochemical expression of cytokeratin 19 in odontogenic keratocyst, dentigerous, and radicular cysts
...Show More Authors

Background: Odontogenic cysts are characterized by their sluggish growth and ability to enlarge, primarily affecting the oral and maxillofacial tissues. Timely diagnosis and treatment are crucial to prevent potentially serious consequences. The present study aimed to evaluate and compare the immunohistochemical expression of cytokeratin 19 in the epithelium of odontogenic keratocyst, dentigerous, and radicular cysts.

Methods: This study analyzed forty-five formalin-fixed, paraffin-embedded tissue blocks containing odontogenic cysts. The sample consisted of fifteen odontogenic keratocysts, fifteen dentigerous cysts, and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Physics: Conference Series
A comparative Analytical Investigation of Different Geomagnetic Storms During Solar Cycles 23 and 24
...Show More Authors
Abstract<p>In this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Microporous And Mesoporous Materials
Using the ash of common water reeds as a silica source for producing high purity ZSM-5 zeolite microspheres
...Show More Authors

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Nov 01 2014
Journal Name
J Clin Dermatol Ther
Debulking of keloid combined with intralesional injection of methotrexate and triamcinolone versus intralesional injection of methotrexate and triamcinolone
...Show More Authors

KE Sharquie, AA Noaimi, MR Al-Karhi, J Clin Dermatol Ther, 2014 - Cited by 8

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Thu Nov 30 2023
Journal Name
Research Journal Of Pharmacy And Technology
Preparation and Evaluation of Aceclofenac Solid Dispersion by Fusion Technique and Effervescent Assisted Fusion Technique: Comparative Study
...Show More Authors

Solid dispersion (SD) is one of the most widely used methods to resolve issues accompanied by poorly soluble drugs. The present study was carried out to enhance the solubility and dissolution rate of Aceclofenac (ACE), a BCS class II drug with pH-dependent solubility, by the SD method. Effervescent assisted fusion technique (EFSD) using different hydrophilic carriers (mannitol, urea, Soluplus®, poloxamer 188, and poloxamer 407) in the presence of an effervescent base (sodium bicarbonate and citric acid) in different drug: carrier: effervescent base ratio and the conventional fusion technique (FSD) were used to prepare ACE SD. Solubility, dissolution rate, Fourier transformation infrared spectroscopy (FTIR), PowderX-ray diffraction

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 21 2020
Journal Name
International Journal Of Environmental Analytical Chemistry
Comparative study of embedded functionalised MWCNTs and GO in Ultrafiltration (UF) PVC membrane: interaction mechanisms and performance
...Show More Authors

View Publication
Scopus (45)
Crossref (42)
Scopus Clarivate Crossref