Preferred Language
Articles
/
IxYdCocBVTCNdQwCpjES
Predictive model for stress at ultimate in internally unbonded steel tendons based on genetic expression programming
...Show More Authors

Crossref
View Publication
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Expression of Syndecan 1 on Periodontium treated with Topical Application of Aloe-Vera
...Show More Authors

Background: Periodontium mainly exposed to injury by trauma or pathologic diseases, Aloe vera is a plant has many basic ingredients in its extracted gel that acts as wound healing accelerator in addition to that it's safe, and economical and without recordable of side effect. This study aimed is to evaluate the effect of topical application of Aloe vera on expression of syndecan -1 by periodontium tissue. Materials and methods: Thirty six male Albino rats were subjected for periodontium defect by electric scaler on the distal sides of both lower anterior teeth. The animals divided into two groups; control group (without treatment) and the experimental group treated with 1µLAloe vera gel/normal saline. Periodontal healing was examined at

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 25 2018
Journal Name
Summaries Of Working Papers, Research And Experiments
E-learning at the College of Mass Communication, subject: public relations campaigns as a model
...Show More Authors

Publication Date
Fri Dec 24 2021
Journal Name
Iraqi Journal Of Science
A Model of Sky Temperature Estimation at 1.42 GHz using University of Baghdad’s Radio Telescope
...Show More Authors

 The objective of this study is to select a suitable observing region at Baghdad location (44o 22' 48", 33o 16' 30") with low interference that may affect frequency of 1.42 GHz. Baghdad University Radio Telescope (BURT) is used in this study to determine a convenient region for observation in Baghdad sky. Different azimuths and elevations were chosen at different observations time. The results of this study showed that the best observations regions were located at azimuth (120o-160o) and (210o-260o). These regions included less sky temperature and estimated to be (42.8 to 163) K. The sky temperature model could be represente

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Students Experience of Hybrid- Education Model at The University of Baghdad College of Pharmacy
...Show More Authors

The impact of COVID-19 pandemic on education models was mainly through the expansion of technology use in the different educational programs. Earlier impact of COVID-19 was manifested in the complete and sudden transition to distance education regardless of institution preparedness status. Gradually, many institutions are moving back to on-campus face-to-face education. However, others including all higher education institutions in Iraq are adopting the hybrid education model. This report presents part of the end of semester evaluation survey conducted at the University of Baghdad College of Pharmacy for the Spring 2021 semester. The survey aims to address points of strength and weakness associated with the hybrid education model and spe

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Survival estimation for singly type one censored sample based on generalized Rayleigh distribution
...Show More Authors

This paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref