Preferred Language
Articles
/
ERdsaI8BVTCNdQwCmnfM
Effect of Oral Zinc Sulfate on Local Inflammatory Cytokines Level in Iraqi Women Infected With Human Papillomavirus (HPV)
...Show More Authors

This study was aimed to monitor oral zinc sulfate role on local cervical proinflammatory cytokines in HPV-infected women comparing with these cytokines before treatment application. A cervical secretion got from 28 infected women before and after treatment with zinc sulfate, these samples assessed various markers of inflammation including interleukin-1β, IL-8, and IL-12. Results manifested that improve and clear the cervical HPV infections after three months of zinc treatment 46.43% and 21.43%, respectively. Viral infections with single and multiple HPV high-risk types are raising of studied cytokines after 3-month compared with single HPV low-risk type. Moreover, this increasing was statistically significant only in IL-12 and IL-1. Women more than 30 years and with multiple HPV genotypes are the most benefit of zinc treatment had a high level of cytokines. This study concludes that IL-1 and IL-12 secretion are the most effects with zinc treatment at over three months to improve mild HPV infection with good hygiene.

Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Structural flexibility and its impact on contemporary architecture
...Show More Authors

. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Temperature Effects on Intensity Distribution at Emage Plane
...Show More Authors

To evaluate the effects of the thermal analysis and temperature of the atmospheric heat on the optical system. it varying the thermal expansion  (positive  or  Negative  Values)  of  the  material  and  then changes the characteri of the optical system properties such as radius of curvetur of the surfaces, size of the aperture stop     ect.

This paper  had calculated the accepted ratio of the temperature variable   on the optical system during analyzing the effect of thermal analysis on the Radial Energy Distribution for +20C0 and +50C0  â€¢

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF