Preferred Language
Articles
/
KhZju4sBVTCNdQwCHNlN
Evaluation of maize hybrids, their inbred lines and estimation of genetic divergence based on cluster analysis
...Show More Authors

Scopus
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Mechanical and Histological Significance of Nano Hydroxyapatite and Nano Zirconium Oxide Coating On the Osseointegration of CP Ti Implants
...Show More Authors

Background: Dental implant considers a unique treatment option for the replacement of missing dentition. The new trend of implants is looking for materials which accelerate bone formation in bone implant interface and enhance osseointegration to provide immediate loading directly after placement and decrease the time period which is disturbs patients and uncomfortable. The aim of the study was to evaluate the effect of nano zirconium oxide (ZrO2) and nano hydroxyapatite (Hap) mixture coating of screw shaped commercially pure titanium (cpTi) implants on bond strength at the bone implant interface with torque removal test and histological analysis in comparison with non coated implants. Materials and methods: Forty screws were machined from c

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Asian Journal Of Pharmacy And Pharmacology
Genetic polymorphisms associated with diabetic foot ulcer: A review article
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Asian Journal Of Pharmacy And Pharmacology
Genetic polymorphisms associated with diabetic foot ulcer: A review article
...Show More Authors

Diabetic foot ulcer (DFU) or Lower limb ulcers are one of the major complications caused by diabetes mellitus especially when patients fail to maintain tight glycemic control. DFU is linked to multiple risk factors along with the genetic factors and ethnicity which play a significant role in the development of DFUs through their effects on multiple aspects of the pathophysiological process. This narrative review aimed to summarize all the previous studies within the last ten years associating gene polymorphism and DFU. Polymorphism associated with vascular endothelial growth factor (rs699947), the G894T polymorphism of the endothelial nitric oxide synthase gene, interleukin-6–174 G>C gene polymorphism, heat shock protein 70 gene polymorph

... Show More
Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A Parallel Adaptive Genetic Algorithm for Job Shop Scheduling Problem
...Show More Authors

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref