Preferred Language
Articles
/
bijps-1060
Nanotechnology-Based Topical Drug Delivery Systems for Management of Dandruff and Seborrheic Dermatitis: An overview
...Show More Authors

Dandruff and seborrheic dermatitis (SD) are common skin disorders affecting the scalp and extending to other body sites in the case of SD. They are associated with pruritus and scaling, causing an esthetical disturbance in the population affected.   Treatment of such conditions involves using a variety of drugs for long terms, thus optimizing drug formulation is essential to improve therapeutic efficacy and patient compliance. Conventional topical formulations like shampoos and creams have been widely used but their use is associated with disadvantages. To overcome such effects, novel topical nanotechnology-based formulations are currently under investigation. In the following article, we highlight recently published formulation approaches used to improve topical dandruff/SD therapy

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The Role of T.V. Shaws in Transmitting Violence in Children: An Analytic Study for T.V. Chanels for Children During 1/3/2014 – 1/9/2014: يوسف محمد حسين
...Show More Authors

Our study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analyzing the net profitability of total investments using a constructed mathematical model: An applied research at Iraqi Middle East Bank for investment for the financial years 2008-2010
...Show More Authors

The trading banks in Iraq invest their funds according to regulations imposed by the Central Bank in Iraq in different financial fields like stock exchanges, acquire stocks as assets that could be sold at any time as well as make loans and contributing in corporations establishment also magnitude foreign capital through direct contacts with foreign exchange markets.

We can summarize the problem of this paper as shortage in mathematical models that used in studying and analyzing these investments and according to this problem we used (a constructed mathematical model ) consists of three major indicators: profitability of total investment assets which is divided into three sub-indicators: owners equity risk indicator, debits risk i

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
The Trilogy of Punishment - The Great, Painful and Humiliating in the Holy Quran An objective study: The Trilogy of Punishment - The Great, Painful and Humiliating in the Holy Quran An objective study
...Show More Authors

The study of triples seeks to deal with the comprehensive nature of the Qur’an texts, and the choice fell on the trilogy of great torment, pain, and humiliation in the Noble Qur’an - an objective study, the title of this research, in which I tried to shed light on these terms, and the nuances between them, and in particular torment The eschatological terminology varied, which can be summed up in three terms, namely the great, the painful, and the offensive. The types of torment, the pain is the painful one that is described by the severity of pain and its horror, as for the humiliating punishment, it is that which humiliates the one who has fallen on it, and the diversity of torment is due to the diversity of sins.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Development of an On-Line Self-Tuning FPGA-PID-PWM Control Algorithm Design for DC-DC Buck Converter in Mobile Applications
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
AN ECONOMIC STUDY TO MEASURE THE IMPACT OF THE MAIN VARIABLES ON RURAL POVERTY IN IRAQ FOR THE PERIOD 1990-2019
...Show More Authors

View Publication Preview PDF
Crossref