Preferred Language
Articles
/
BBeLJJMBVTCNdQwCW8cS
Radiological Modalities for the Assessment of Fetal Growth Restriction: A Comprehensive Review
...Show More Authors

Fetal growth restriction is a significant contributor to fetal morbidity and mortality. In addition, there are heightened maternal risks associated with surgical operations and their accompanying dangers. Monitoring fetal development is a crucial objective of prenatal care and effective methods for early diagnosis of Fetal growth restriction, allowing prompt management and timely intervention to improve the outcomes. Screening for Fetal growth restriction can be achieved via many modalities; it can be medical, biochemical, or radiological. Some recommended combining more than one for better outcomes. Currently, there is inconsistency about the best method of Fetal growth restriction screening.   In this review, a comprehensive evaluation of the current radiological methods used for Fetal growth restriction, including serial growth scan, Doppler velocimetry, and biophysical profile is offered.  Limitations, and potential enhancements area were specifically analyzing the effectiveness. Moreover, recently developed experimental radiological techniques were presented and how to integrate them into practice to enhance follow-up performance and results.  

Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Language Teaching And Research
Emotional Blackmail in Breaking Bad Series: A Pragma-Stylistic Study
...Show More Authors

Although language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles’ speech acts (1979), Grice’s maxims (1975), Brown and Levinson’s politeness (1987), Culpeper’s impoliteness (1996), and Simpson’s stylistic le

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La femme fugitive dans ‘’A une passante’’ de Charles Baudelaire
...Show More Authors

The main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady.  Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.

 

This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk

... Show More
View Publication Preview PDF
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Single Particle Level Density in a Harmonic – Oscillator Potential Well
...Show More Authors

The purpose of this paper is to study the properties of the
partial level density ( ) l g and the total level density g ( ),
numerically obtained as a l sum of ( ) l g up to 34 max l  , for
a Harmonic – Oscillator potential well. This method applied the
quantum – mechanical phase shift technique and concentrated
on the continuum region. Also a discussion of peculiarities of
quantal calculation for single particle level density of energy –
dependent potential

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref