Preferred Language
Articles
/
EBbk4IkBVTCNdQwCBY5T
Corneal elevation topographic maps assessing different diseases detection: A review
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (99)
Crossref (91)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (32)
Crossref (20)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 07 2022
Journal Name
Iraqi Journal Of Laser
Influence of Fractional CO2 Laser Irradiation on Temperature Elevation and Bonding Strength of Resin Cement to the Zirconia Ceramic
...Show More Authors

Abstract: Objectives: To investigate the effect of temperature elevation on the bonding strength of resin cement to the zirconia ceramic using fractional CO2 laser. Background: Fractional CO2 laser is an effective surface treatment of zirconia ceramic, as it increases the bonding strength of zirconia to resin cement. Methods: Thirty sintered zirconia discs (10 mm diameter, 2 mm thickness) were prepared and divided to three groups (N=10) and five diffident pulse durations were used in each group (0.1, 0.5, 1, 5 and 10 ms). Group A was treated with 10 W power setting, group B with 20 W and group C with 30 W. During laser irradiation, temperature elevation measurement was recorded for each specimen. Luting cement was bonded to the treated z

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Basic Education
Beta-2-Microglobulin as a Biomarker in Iraqi Female Patients with Autoimmune Thyroid and Renal Autoimmune Thyroid Diseases
...Show More Authors

The present study was performed on 80 female subjects between (30-60) years, who attended the Specialized Center for Endocrinology and Diabetes during the period from April to July; 2011. The subjects were divided into 3 groups : controls , non diabetic autoimmune thyroid patients , and non diabetic autoimmune thyroid patient with renal diseases as complication The results showed a significant increase in serum T 3 T4 levels in hyperthyroidism patients, and significant decrease in serum T3,T4 levels in hypothyroidism patients ,while a significant difference in serum TSH levels in hyperthyroidism and hypothyroidism patients when compared to control group The results show also a significant increase in serum antibodies to thyroid peroxidas

... Show More
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Anal Fissure: Is it becoming a medical disorder? Review Article
...Show More Authors

An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 07 2021
Journal Name
International Journal Of Applied Pharmaceutics
APPLICATION OF 3D PRINTING IN INNOVATED DRUG DELIVERY: A REVIEW
...Show More Authors

Increasing requests for modified and personalized pharmaceutics and medical materials makes the implementation of additive manufacturing increased rapidly in recent years. 3D printing has been involved numerous advantages in case of reduction in waste, flexibility in the design, and minimizing the high cost of intended products for bulk production of. Several of 3D printing technologies have been developed to fabricate novel solid dosage forms, including selective laser sintering, binder deposition, stereolithography, inkjet printing, extrusion-based printing, and fused deposition modeling. The selection of 3D printing techniques depends on their compatibility with the printed drug products. This review intent to provide a perspecti

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Fri Jun 20 2014
Journal Name
Jurnal Teknologi
A Review of Snake Models in Medical MR Image Segmentation
...Show More Authors

Developing an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal

... Show More
Scopus (10)
Scopus