Preferred Language
Articles
/
KRaQ4osBVTCNdQwCX-NH
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an overview of biometrics systems and approaches in the post-COVID-19 pandemic. The fundamental COVID-19 prevention rules are first reviewed. The relationships between each regulation and the biometrics that may be impacted are then thoroughly investigated. Recommendations for future trends of feasible approaches are provided to assist researchers in advance and enhance the performance of the biometric system for the post-COVID-19 pandemic environment.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
...Show More Authors

The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera

... Show More
View Publication
Scopus (9)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Economic Benefits for the Application of Standards of Sustainability in Construction Projects
...Show More Authors

In this research, that been focused on the most important economic benefits expected when applying the three standards of sustainability in construction projects (economic, environmental and social). Fuzzy AHP, a multi-decision decision-making technique for evaluating construction projects. Which when used we get the speed and accuracy in the results. Using this technique will reduce uncertainties decisions significantly (fuzzy environment), that found in most projects .The results of the data analysis showed  that the economic standards take the greatest relative importance (60%) among the three sustainability standards. Therefore, the implementation of any standards need a cost so the economic benefit of any proje

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Prensa Medica Argentina
The effect of niclosamide in acetic-acid induce colitis: An experimental study
...Show More Authors

Scopus (24)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Metformin Treatment on some Blood Biomarkers in Women with Endometriosis.
...Show More Authors

 Endometriosis is a common women health disorder that occurs when Endometrial-like tissue grows outside the uterus. This may lead to irregular bleeding , pelvic pain, infertility and other complications.   Metformin,  because of its activity to improve  insulin sensitivity, it is  used for  the treatment of diabetes; it  also  has a modulatory  effect  on  ovarian  steroid  production and has  anti-inflammatory  properties,  all may  suggest  its possible effect in treatment  of endometriosis. This  study  was  planned  to  determine  the  effect  of  metformin  on serum levels  of&nbs

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Chaos in the three-species Sokol-Howell food chain system with fear
...Show More Authors

View Publication
Scopus (13)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Biology, Pharmacy And Allied Sciences
WORKPLACE VIOLENCE TOWARD EMERGENCY DEPARTMENT MEDICAL STAFF IN BAGHDAD MEDICAL CITY 2016
...Show More Authors

ABSTRACT Background: The Iraqi hospital witnessed numerous violence incidents against medical staff working in emergency department and range from verbal to physical violence. High frequency of these attacks urged the Iraqi doctors for migration. Aim of study: To identify the prevalence of workplace violence against medical staff and to and study the risk factors related to work place violence. Materials and methods: A descriptive cross sectional study carried out among a sample of 300 medical

Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
T-Cells Proliferation and Serum Cytokine levels in Type 1 Diabetic Children
...Show More Authors

Background: There is plenty of evidence
suggesting that involvement of several groups of
viruses in the development and / or acceleration of
Type 1 Diabetes Mellitus (T1DM).
Objective: To analyze the T- cell proliferation in
the presence of Coxsackie virus B5 (CVB5), Polio
and Adenovirus antigens in addition to assessment
of Interferon- gamma (IFN-γ), Interleukins (IL-10
and IL-6).
Methods: In 60 Iraqi T1DM children with recent
onset of T1DM, Lymphocyte proliferation was
analyzed using Methylthiazol tetrazolium (MTT)
assay by culturing Peripheral Blood Lymphocytes
(PBLs) with Coxsackie Virus B5 (CVB5),
Adenovirus, and Polio vaccine. Serum Interferon-γ,
IL-10 and IL-6 were quantified by sandw

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
INHERITANCE OF DARK HEAD AND SIPHON IN THE LARVAE OF CULEXQUINQEFASCIATUS SAY
...Show More Authors

A new spontaneous mutation (dh) is described for Culex quinquefasciatus Say. This
phenotype was observed in the second generation to cause complete coloration of the head
capsule and the siphon of the larvae. This character is mainly detectable in the larval stage
and slightly in the adult stage.
The reciprocal mass matting between mutants from F2 generation and normal wild type
sibs, revealed that the mode of inheritance can be controlled by an autosomal recessive
gene(s). This happened for both sexes with slightly variability in their expression. No
significant larval mortalities were found in all crosses.

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Imam Al-Zayla'i's Tracks on Imam Mardini   In his Banner Monument
...Show More Authors

The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.

View Publication Preview PDF