Preferred Language
Articles
/
ORjYYJQBVTCNdQwCfxTt
On a Subclass of Meromorphic Univalent Functions With Fixed Second Coefficientsassociated with q-Differed Operator
...Show More Authors

The main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are  the obtained results.

Scopus Crossref
View Publication
Publication Date
Sun Jun 09 2019
Journal Name
Al-kindy College Medical Journal
The Prevalence of Acetabular Retroversion among Adult Patients Presenting with Hip Pain in Orthopedic Clinic of Al-Kindy Teaching Hospital
...Show More Authors

Background: Acetabular retroversion has been proposed to contribute to the development of pain and osteoarthritis of the hip. Conventional anteroposterir (AP) pelvic radiographs may represent a reliable, easily available diagnostic modality.

Objective: To obtained a reproducible technique allowing the anterior and posterior acetabular rims to be visible for assessment

Method: This is a cross-sectional study conducted from December 2015 to March 2017 targeting patients with hip pain in orthopedic clinic of Al-Kindy teaching hospital. The study sample consisted of 100 patients with hip pain who were investigated with Antroposterior pelvic plain x-ray, which was done for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied Thermal Engineering
Experimental evaluation of thermal efficiency, electrical efficiency, and power production of low-concentrating photovoltaic-thermal system with micro-jet channel
...Show More Authors

The efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system

... Show More
View Publication
Scopus (21)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri Jan 06 2023
Journal Name
Journal Of Advanced Biotechnology And Experimental Therapeutics
Evaluation of oxidative stress activity and the levels of homocysteine, vitamin B12, and DNA methylation among women with breast cancer
...Show More Authors

Breast cancer (BC) is the most common malignant tumor in women and the leading cause of cancer deaths worldwide. This work was conducted to estimate the roles of oxidative stress, vitamin B12, homocysteine (HCY), and DNA methylation in BC disease progression. Sixty BC patients (age range 33–80 years) and 30 healthy controls were recruited for this study. Patients with BC were split to group 1 consisted of stage II BC women (low level), and group 2 consisted of patients in stages III and IV (high level). Malondialdehyde (MDA), glutathione peroxidase 3 (GPX3), HCY, and vitamin B12 levels in the study groups were measured. Also, the 5-methylcytosine (5mC) global DNA methylation levels were evaluated. The results showed a significant

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus