Preferred Language
Articles
/
TRj-KpYBVTCNdQwC3ILP
Enhanced aerodynamics for sport cars using inverted wings: A comprehensive review
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (128)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (14)
Crossref (16)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and bot

... Show More
Publication Date
Sat Dec 10 2022
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Actual Benefits of Zinc for Cardiovascular Diseases: Mini Review
...Show More Authors

The leading causes of death, particularly among the elderly, are cardiovascular illnesses, which are frequently linked to altered lifestyle patterns. Numerous academic studies on health and disease have stressed the role of micronutrients like zinc. Furthermore, both healthy and unwell patients are increasingly consuming dietary supplements that contain micronutrients for wellbeing. Cardiovascular disease can be brought on by trace element deficiencies, particularly zinc insufficiency. This study's goal is to analyze current theories regarding the benefits of zinc supplementation for people with cardiovascular problems. We used reliable websites like Google Scholar, PubMed, and Research Gate to find the most recent papers. Preprints

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Microneedles as A Magical Technology to facilitate Transdermal Drug Delivery: A Review Article
...Show More Authors

Skin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (136)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Current Pharmaceutical Analysis
Analytical Methods for the Identification of Pigments in Tattoo Inks and Some of Their Physiological Side Effects: A Review
...Show More Authors

In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Current Pharmaceutical Analysis
Analytical Methods for the Identification of Pigments in Tattoo Inks and Some of Their Physiological Side Effects: A Review
...Show More Authors

In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the stud

... Show More
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref