Preferred Language
Articles
/
alkej-766
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Enhancement of the Solubility and Dissolution Rate of Rebamipide by Using Solid Dispersion Technique (Part I)
...Show More Authors

Solid dispersion is an attractive tool of pharmaceutical technology used to improve the physical properties of drugs. Among these properties is to enhance the solubility of the drugs.
Rebamipide is a poorly soluble drug of class IV of biopharmaceutical classification system (BCS).
Rebamipide is used as potent antiulcer, mucoprotective drug, by stimulating the generation of prostoglandine enhanced mucosal protection.
Rebamipide was formulated as a solid dispersion using different polymers such as pluronic F-127, PEG6000, PVP K30, and TPGS by using different preparation methods solvent evaporation, fusion, and kneading methods.
It was seen that rebamipide was successfully dispersed in a homogenous solid dispersion matrix by sol

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (7)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sat Apr 01 2017
Journal Name
Applied Energy
Melting enhancement in triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (304)
Crossref (304)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 22 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Enhancement of tooth eruption by using amniotic stem cells (Immunohistochemical study of VEGF marker)
...Show More Authors

Background: Tooth eruption is a localized process in the jaws which exhibits precise timing and bilateral symmetry. Develop within the jaws and their eruption is a complex infancy process during which they move through bone to their functional positions within the oral cavity. For species with more than one set of teeth, eruption of the second set also accomplishes. The key to the successful clinical management of tooth eruption consists of understanding that this process consists largely of the local regulation of alveolar bone metabolism to produce bone resorption in the direction of eruption and shift and formation of bone at the opposite side.The amniotic sac contains a considerable quantity of stem cells. These amniotic stem cells are

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Energy
Solidification enhancement in a triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (185)
Crossref (181)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 22 2017
Journal Name
Heat Transfer—asian Research
Thermal Enhancement from Pin Fins by Using Elliptical Perforations with Different Inclination Angles
...Show More Authors
Abstract<p>Many of the proposed methods introduce the perforated fin with the straight direction to improve the thermal performance of the heat sink. The innovative form of the perforated fin (with inclination angles) was considered. Present rectangular pin fins consist of elliptical perforations with two models and two cases. The signum function is used for modeling the opposite and the mutable approach of the heat transfer area. To find the general solution, the degenerate hypergeometric equation was used as a new derivative method and then solved by Kummer's series. Two validation methods (previous work and Ansys 16.0‐Steady State Thermal) are considered. The strong agreement of the validation results (0.3</p> ... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
classification coco dataset using machine learning algorithms
...Show More Authors

In this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho

... Show More