Preferred Language
Articles
/
8hcgPo8BVTCNdQwCpGRl
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 06 2024
Journal Name
International Journal Of Applied Engineering & Technology
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Feb 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
SPRITE REGION ALLOCATION USING MOTION COMPENSATION TECHNIQUE
...Show More Authors

In this paper, the developed sprite allocation method is designed to be coherent with the introduced block-matching method in order to minimize the allocation process time for digital video. The accomplished allocation process of sprite region consists of three main steps. The first step is the detection of sprite area; where the sequence of frames belong to Group of Video sequence are analysed to detect the sprite regions which survive for long time, and to determine the sprite type (i.e., whether it is static or dynamic). Then as a second step, the flagged survived areas are passed through the gaps/islands removal stage to enhance the detected sprite areas using post-processing operations. The third step is partitioning the sprite area in

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Pakistan Journal Of Medical And Health Sciences
The Effect of Music Therapy on Clients' Vital Signs during Pulmonary Function Test: An Experimental Study
...Show More Authors

Background: The patient's vital signs must stay stable pre a pulmonary function test since the approach demands the patient to breathe slowly and deeply and exhale quickly. However, events that cause variations in normal vital signs may impact the patient. Many strategies can be utilized to stabilize vital signs, including music treatment. The purpose of this study is to compare the effectiveness of music therapy on the vital signs of client's pre a pulmonary function test. Methods: An experimental design study with an application (pre-test, post-test), to determine the effectiveness of music therapy for clients pre pulmonary function test for 106 clients in Al-Diwaniyah, Al-Shamiya, and Al- Hamza public hospitals In Iraq. Parti

... Show More
View Publication
Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Military Medical Science Letters
SOLID LIPID NANOPARTICLES AS A PROMISING APPROACH FOR DELIVERY OF ANTICANCER AGENTS: REVIEW ARTICLE
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Military Medical Science Letters
SOLID LIPID NANOPARTICLES AS A PROMISING APPROACH FOR DELIVERY OF ANTICANCER AGENTS: REVIEW ARTICLE
...Show More Authors

Cancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jul 01 2011
Journal Name
25th International Cartographic Conference
User generated content and formal data sources for integrating geospatial data
...Show More Authors

Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o

... Show More
Publication Date
Fri Dec 31 2021
Journal Name
Dental And Medical Problems
Effect of the local application of bupivacaine in early pain control following impacted mandibular third molar surgery: A randomized controlled study
...Show More Authors

Background: Postoperative pain is one of the main complications following impacted mandibular third molar (IMTM) surgery. Objectives: The aim of this study was to assess the effect of the local application of bupivacaine on reducing early postoperative pain following IMTM surgery. Material and methods: A prospective, single-blinded, randomized controlled study was conducted on 40 patients who had undergone the surgical removal of an IMTM under local anesthesia. In the study group (n = 20), absorbable gelatin sponge (AGS) soaked in 3 mL of 0.5% plain bupivacaine hydrochloride was locally applied in the post-extraction socket. In the control group (n = 20), AGS soaked in 3 mL of normal saline was used. Pain intensity was assessed using a pa

... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref