Preferred Language
Articles
/
vxYJkIoBVTCNdQwC558b
A Framework of Temporal-Spatial Descriptors-Based Feature Extraction for Improved Myoelectric Pattern Recognition
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Iraqi-US relations in the light of the strategic framework agreement
...Show More Authors

The United States has stood by Iraq and supported militarily and morally, but the relationship did not quickly be strained again before August 1990, when the oldest former political system in Iraq after Iraqi troops entered the territory of Kuwait, the United States stood beside Kuwait because the two parties link military ties opted States United to support the Kuwaiti side relying on the resolutions passed by the UN security Council, the United States and found in this issue right opportunity to execute the mechanics of meddling in Iraqi affairs and the various means of political, economic, military, and methods for dealing with Iraq, especially after finding the impediment standing in front of the implementation of its goals The strat

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Craniofacial Surgery
Novel Application of Platelet-Rich Fibrin as a Wound Healing Enhancement in Extraction Sockets of Patients Who Smoke
...Show More Authors

View Publication
Crossref (21)
Clarivate Crossref
Publication Date
Mon Aug 31 2020
Journal Name
Bmc Oral Health
The success of using 2% lidocaine in pain removal during extraction of mandibular premolars: a prospective clinical study
...Show More Authors
Abstract<sec><title>Background

The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.

Methods

Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Extraction Drainage Network for Lesser Zab River Basin from DEM using Model Builder in GIS
...Show More Authors

ArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Romanian Neurosurgery
Mobilization of the temporal pole as integrated step in microsurgical clipping of pure posteriorly directed posterior communicating artery aneurysm
...Show More Authors

A pure posteriorly posterior communicating artery (PCoA) aneurysm represents a surgical challenge. This is mainly when there is a need for good exposure of the aneurysmal neck, sac, PCoA, and anterior choroidal arteries. Ruptured pure posteriorly directed PCoA aneurysm imposes significantly extra challenge as the surgeon undergoes dissection through a tight brain. Even with measures commonly used to attain brain relaxation like the lumbar drain and cisternal fenestration. Here, we describe a technique for posterior temporal pole mobilization (TPM) as an integrated part of microsurgical clipping of ruptured pure posteriorly directed PCoA aneurysms. This technique is implicated in twenty-three successive cases of ruptured PCoA aneurys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 30 2025
Journal Name
Alnahrain Journal Of Legal Scienci
Elements and Conditions of Personal Civil Liability (Based on Fault) for the Government for Damages Caused by Demonstrations: A Comparative Study
...Show More Authors

This study examines the position of comparative legislation (French legislation, English legislation, and Egyptian legislation) in addressing the regulation of personal civil liability (based on fault) for the government. About the damages caused by demonstrations in terms of their legal nature, their legal basis, and the pillars and conditions of that responsibility. Then, we explain the position of the Iraqi legislator and compare it with what is the case in the legislation mentioned above

Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF