Preferred Language
Articles
/
GRZaVYcBVTCNdQwCnUaI
Identification of key determinants in<i>Porphyromonas gingivalis</i>host-cell invasion assays
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Use of Bark Water Extracts of Eucalyptus camaldulensis to Control the Snail Host Bulinus truncates of Urinary Schistosomiasis
...Show More Authors

  The present study is a contribution to determine the effect of bark water extracts of the common trees of Eucalyptus camaldulensis to control the snail intermediate host (Bulinus truncatus) of urinary Schistosomiasis in Iraq. It was found that the lethal concentrations of bark phytochemicals to this snail were ranging from 10gm/l to 50gm/l.The effect of bark extracts was very remarkable during the first 24 hours.

View Publication Preview PDF
Publication Date
Sun Nov 20 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ISOLATION AND IDENTIFICATION OF BACTERIA THAT PRODUCE AMYLASE: ISOLATION AND IDENTIFICATION OF BACTERIA THAT PRODUCE AMYLASE
...Show More Authors

Thirty six bacteria were isolated from various sourcesc (soil, starch, cooked rice and other foods) and subjected to a series of primary screening tests to obtain the optimal isolation to production of amylase. The volume of producing zone by logal indicator for (Seven) isolates of the secondary screening by measuring the enzymatic activity and specific enzymatic activity. The isolate A4 was found to be the most efficient for production of amylase. Then this isolate was diagnosed through microscopic, vitek 2 system technique. in addition by gentic diagnesis through gene 16s of the genes nitrogen bases by use the polymerase chain reaction (PCR) which reached 1256 bases. In comparison to the available information at the National Center for

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Assessment of stromal eosinophilia in cutaneous squamous cell carcinoma
...Show More Authors

Background: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association.

Aim of the study

The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma.

Methods: In this retrospective study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Assessment of stromal eosinophilia in cutaneous squamous cell carcinoma
...Show More Authors

Background: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association. Aim of the study The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma. Methods: In this retrospective study done at the histopathology department of al Wasity teaching hospital for orth

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Advancements In Life Sciences
Molecular identification of Epstein-Barr virus in human placental tissue
...Show More Authors

Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete

... Show More
Preview PDF
Scopus
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Identification of Cladosporium sp. Fungi by in- silico RFLP-PCR
...Show More Authors

Cladosporium sp. plays an important role in human health, it is one of the pathogenic fungi which cause allergy and asthma and most frequently isolated from airborne spores.  In this study, a couple of universal PCR primers were designed to identify the pathogenic fungi Cladosporium sp. according to conserved region 5.8S, 18S and 28S subunit ribosomal RNA gene in Cladosporium species. In silico RFLP-PCR were used to identify twenty-four Cladosporium strains. The results showed that the universal primer has the specificity to amplify the conserved region in 24 species as a band in virtual agarose gel. They also showed that the RFLP method is able to identify three Cladosporium spe

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref