Preferred Language
Articles
/
mhb76YoBVTCNdQwCy6j9
Multi-objectives TLBO hybrid method to select the related risk features with rheumatism disease
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 01 2023
Journal Name
Clinical Epidemiology And Global Health
The association of interleukin-10 single nucleotide polymorphisms (rs1800871) and serum levels in Iraqi patients with celiac disease: A case-control study
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Correlation between Caries Related Microorganisms in the Dental Plaque and Saliva with Dental Caries Level in the Upper and Lower Jaws in 5-9 Years Old Children in Baghdad City
...Show More Authors

Background: The oral cavity is considered as a complex ecological niche, its complex microbial community is reflected to it. Streptococcus mutans has been implicated as one of the major etiological factor of dental caries. Tooth surfaces colonized with Streptococcus mutans are at a higher risk for developing caries, while lactobacilli are considered as the secondary invaders, not initiators of the carious lesion. The main purpose of this study was to correlate the dental caries (for primary and permanent teeth) in the upper jaw with the streptococcus mutans and lactobacilli count in the dental plaque and saliva, also to correlate the dental caries (for primary and permanent teeth) in the lower jaw with the streptococcus mutans and lactobaci

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
Exercises based on the phosphogenic energy system to develop the ability to perform with precision and accuracy
...Show More Authors

Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle

... Show More
Crossref (1)
Crossref
Publication Date
Sat Jul 15 2017
Journal Name
8th International Conference On Agricultural, Environment, Biology And Medical Sciences
Anatomical features of (Eichhornia crassipes (Mart.) Solms) growing in Iraq
...Show More Authors

Eichhornia crassipes (Mart.) Solms or Water hyacinth is a fertile floating aquatic widespread in worldwide. The form of plants and the anatomy parts of this plant were studied. The most important feature was obvious the air chamber with intercellular spaces by amazing arrangement. As well can notice aerenchyma tissue allow the parts of plants floated on the surface of water located in the ground meristem of root, petiole and in the mesophyll of leaves also presence of two type of crystals raphides and styloid crystals was noted of various member in the plant in addition appear astrosclereids around the air chambers, to support the plant parts from the unsuitable environmental conditions such as the speed of water flow or floods or high leve

... Show More
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
...Show More Authors

Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)

View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus