Preferred Language
Articles
/
axfKWJMBVTCNdQwCZNGS
Studying The Changes in Motility and Morphology on Human sperm after exposure to low doses of x-rays
...Show More Authors

the energy that a radiation source emits as light (photons), electromagnetic waves, or particles is known as radiation. X-ray is one type of ionizing radiation that falls within the electromagnetic wave category of short wavelengths. Because of their short wavelength. X-ray is a type of ionizing radiation that is used in a constantly growing number of diagnostic procedures. X-ray diagnostic imaging has been employed in the medical field for more than a century(Hariyoto et al., 2020). Radiation has advantages for human health, but there is also a risk. the impacts of Radiation on Fertility it is an oligospermia, or a reduction in the number of sperm cells, which is already possible after radiation exposure of 0.15 mGy. It Leads to impedes the process of generating the resultant sperm cell through a deterministic effect. (Tuieng et al., 2021). Infertility affects 1 in 6 couples globally. Nearly 50% of infertility cases are caused by male causes. Although low sperm counts, abnormal sperm morphology, and impaired sperm motility are recognized causes, the underlying reasons remain unknown in 25% of instances.(Inhorn and Patrizio, 2014). Human infertility is reliant on the meiotic process, which leads to the development of germ cells. This procedure is extremely radiation-sensitive. the relationship between radiation exposure and infertility is thought to originate from DNA damage induced by free radicals originating from radiation ionization. DNA damage might cause some mutations or cause cell death (apoptosis). (Skrzypek et al., 2019) Even though X-rays are one of the most common diagnostic instruments used on patients, not much study has been done on the impacts of X-ray exposure on medical workers. One condition that is commonly observed in medical workers who are exposed to radiation regularly is infertility. For the diagnosis of many illnesses, radiodiagnosis tools like C-ARM, and CT-SCAN. X-rays are still the mainstay. Frequent usage of small amounts of X-ray radiation can have an accumulating effect that results in other abnormal epigenetic patterns and DNA damage. To reduce the radiation exposure of medical workers, further study is required to find the best X-ray doses, times, and saf

Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Impact the Organizational downsizing in organizational health: Analytical research in the Directorate of Education in Nineveh
...Show More Authors

This research aims to determine the extent of the contribution of organizational downsizing strategies to enhance the health of the researched organization represented by the Directorate of Education in Nineveh, and to achieve this goal, the study provided a simplified intellectual framework for the most important topics covered by writers and researchers for search variables, reinforced by an applied analytical framework for the opinions of (79) individuals responsible for the researched organization. The research adopted organizational downsizing as an independent variable that includes three dimensions represented by (reduction of human resources, job redesign, systemic strategy), while the organizational health represented th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fibrewise Lindelöf and Locally Lindelöf Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B

... Show More
Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref