Preferred Language
Articles
/
6BfS8pIBVTCNdQwCdsMy
Music Medicine Intervention--Based Program for Reducing Pain and Anxiety of Children Undergoing Bone Marrow Aspiration and Lumber Puncture Procedures
...Show More Authors

Publication Date
Fri Dec 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of Simvastatin carried by Chitosan nanoparticle on bone regeneration using Masson’s Trichrome histochemical stain
...Show More Authors

Background: Due to the complicated and time-consuming physiological procedure of bone healing, certain graft materials have been frequently used to enhance the reconstruction of the normal bone architecture. However, owing to the limitations of these graft materials, some pharmaceutical alternatives are considered instead.  Chitosan is a biopolymer with many distinguishing characteristics that make it one of the best materials to be used as a drug delivery system for simvastatin. Simvastatin is a cholesterol lowering drug, and an influencer in bone formation process, because it stimulates osteoblasts differentiation, bone morphogenic protein 2, and vascular endothelial growth factor. Objectives: histological, histochemical and histomorp

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Program in Developing Awareness of the Criteria for Judging Electronic Educational Materials Among Students of Teaching Diploma at Dhofar University
...Show More Authors

The study aims to develop the awareness of the criteria for judging electronic educational materials among students of educational qualification at Dhofar University over spreading the Corona pandemic through a program based on mini-educational units. The study was applied to (18) students studying Teaching diploma at Dhofar University for the academic year 2020-2021, and their number. They were chosen intentionally. The study resulted in reaching a list of criteria for judging electronic educational materials, roughly (18) criteria in the selection themes and (15) criteria in the use theme. The level of awareness of the sample members with the criteria for selecting and using electronic educational materials and the effectiveness of the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربوية والنفسية
The effect of a training program for chemistry teachers on matching both sides of the brain together on the academic achievement of their students
...Show More Authors

Preview PDF
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref