Preferred Language
Articles
/
XBiD5pYBVTCNdQwC0Ik6
Antibacterial and wound healing performance of a novel electrospun nanofibers based on polymethyl-methacrylate/gelatin impregnated with different content of propolis
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Middle-east Journal Of Scientific Research
Question Classification Using Different Approach: A Whole Review
...Show More Authors

Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Mar 14 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Determine the chemical content of Bay (Laurus nobilis L.) leaves extract and its effectivenss against some bacterial species: Determine the chemical content of Bay (Laurus nobilis L.) leaves extract and its effectivenss against some bacterial species
...Show More Authors

This study has been performed to study the inhibitory effects of crude plant extracts of Bay (laurus nobilis) leaves against some bacterial isolates represented by Staphylococcus aureus, Staphylococcus epidermids, Proteus vulgaris, Bacillus subtilis, Escherichia coli, and Pseudomonas aeroginosa in vitro. The results showed that percentages of essential chemical of laurus nobilis leaves which represented by moisture, total oil, total ash, crude protein, crude fibers, carbohydrites and caloric values in dry weight are 5.96, 4.28, 14.2, 8.75, 24.8, 76.99%, and 284.92 kcal/100g respectively, the percentages of some major and minor mineral elements of laurus nobilis leaves powder which represented by Mg, Fe, Cu, Pb, Cd and As, are: 0.211, 0.1

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF TRAINING BASED UPON MERITS IN IMPROVING THE EMPLOYEES PERFORMANCE AT THE JORDANIAN UNIVERSITY HOSPITALS Abstract
...Show More Authors

The study aims to identify the impact of competency-based training in its dimensions (skills, cognitive abilities, attitudes, and attitudes) in improving the performance of employees (achievement, strategic thinking and problem solving) in Jordanian university hospitals.

The study based on analytical descriptive method. The study population consisted of the Jordanian University Hospitals, the University Hospital of Jordan and the King Abdullah Hospital, as applied study case. The sample of the study consists of all upper and middle administrative employees of these hospitals; questionnaire distributed all of them and the number of valid questionnaires for analysis were 182 questionnaire.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Synthesis , Spectroscopic and Antibacterial Studies of Zinc(II) Complexes Derived from Salicylaldehyde, Leucylalanine and Glycylglycine
...Show More Authors

Two Schiff base ligands L1 and L2 have been obtained by condensation of salicylaldehyde respectively with leucylalanine and glycylglycine then their complexes with Zn(II)were prepared and characterized by elemental analyses , conductivity measurement , IR and UV-Vis .The molar conductance measurement indicated that the Zn(II) complexes are 1:1 non-electrolytes. The IR data demonstrated that the tetradentate binding of the ligands L1 and L2 . The in vitro biological screening effect of the investigated compounds have been tested against the bacterial species Staphlococcus aureus, Escherichia coil , Klebsiella pneumaniae, Proteus vulgaris and Pseudomonas aeruginosa by the disc diffusion method . A comparative study of inhibition values of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref