Preferred Language
Articles
/
bsj-3294
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of the Possible Immuno-Protective Effect of Nigella Sativa Seed Oil on Cyclophosphamide- Induced Myelosuppression in Mice
...Show More Authors

Myelosuppression is one of the serious adverse effects of cancer chemotherapy that lead to life threatening febrile neutropenia and considered a limiting factor for successful therapy. Cyclophosphamide a widely used anticancer drugs, induces severe bone marrow suppression by damaging hematopoietic stem cells. As cancer incidence expands globally, the demand for an effective myeloprotective therapy during cancer treatment is also increasing.Nigella sativa seed oil, a well-known plant extract that widely used for various health conditions. This study aims to evaluate the myeloprotective activity of Nigella sativa seed oil in cyclophosphamide-induced myelosuppression mice model. Myelosuppression induced by single intraperitoneal injection o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation the Effect of Phytosterol Fraction of Chenopodium Murale in Comparison with Tacrolimus on Mice Induced Atopic Dermatitis
...Show More Authors

Atopic dermatitis (atopic eczema), is a common familial chronic inflammatory skin disease, determined by xerosis, itching, scaly and erythematous skin lesions, and high serum levels of IgE. Between 10 to 20% of children and 1 to 3% of adults worldwide affected by it and has negative medical and social effect on patients and their families. To evaluate the effectiveness of Phytosterol Fraction of Chenopodium Murale on induced atopic dermatitis (AD) of mice; Forty mice were included in the study, divided in to four groups (10 mice/group): apparently healthy, induced AD without treatment, induced AD treated with Tacrolimus 0.1% ointment, and induced AD treated with Phytosterol Fraction of Chenopodium Murale cream 3% topica

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (22)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
About the construction of fuzzy inner product
...Show More Authors

In this research for each positive integer integer and is accompanied by connecting that number with the number of Bashz Attabq result any two functions midwives to derive a positive integer so that there is a point

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Jpcs
STUDY THE COMPARATIVE EFFECT BETWEEN CYPERUS ESCULENTUS SEEDS EXTRACT AND GENTAMICIN ON INDUCED ENDOMETRITIS IN MICE
...Show More Authors

Objectives of this project were to study the effect of 60% crude alcoholic extract of the seeds of cyperus esculentuson induced endometritis in the mice . The plant of cyperus esculentuswas extracted by preparing Alcoholic extract 60% . One hundred microliters of saline containing Escherichia coli (104cfu) was used to induce endometritis, by a single intracervicallyinjection, and endometritis developed after 2 days from injection. The mice were divided into five groups, The first group were treated with alcoholic extract of cyperus esculentusextract 150mg/kg body weight, the second group was treated with a daily 3mg per kg body weight of gentamicin given intra peritoneal,The third group was treated by 75mg/kg of cyperus esculentusextract an

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
The Effect of Age and occupation on the Type and the Number of workers injuries in construction sector in Iraq
...Show More Authors

World statistics proved that the most of work dangerous accidents, which causes death, are occurred in the construction works. These accidents related to many causes such as loss of workers experience and ignoring rules of safety requirements, especially young workers. Due to the risk of accidents that may occur in the site of work, the idea of this study crystallized to show the relationship between the age of worker and number of injuries and accidents, to identify the causes of these injuries, and to put the appropriate solutions to avoid or reduce the risk of work injuries. Also, the research shows the main principles of safety requirements to forming a clear picture about the subject of the study. A questioner form was prepared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 08 2022
Journal Name
Applied Sciences
Effect of Adjuvant, Concentration and Water Type on the Droplet Size Characteristics in Agricultural Nozzles
...Show More Authors

One of the goals of adding adjuvants to agricultural spray solutions is to enhance the droplet size characteristics of this spray. Droplet size, in turn, has an influence in the deposited spray quality, in addition to the drift and losses of spray to off-target places. The aim of this research was to evaluate the effect of adding adjuvants to two types of water from different sources on the droplet size characteristics. Two types of adjuvants were employed in the tests: the active substance content of the first adjuvant was a 50% aqueous solution of sodium salt of alkylbenzenesulfonic acid—10% (HY), whereas the second was from rapeseed oil (natural origin)—85% (OL). Both adjuvants were tested in two concentrations: the first was

... Show More
View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Opción
Phraseological units of the idafa type in the Quran
...Show More Authors

Scopus