Preferred Language
Articles
/
bsj-8694
Impact of COVID-19 Vaccine on Hearing Status of Young Ages (Medical College Students as a Sample)
...Show More Authors

Many studies dealt with the consequences of  SARS CoV-2  (which cause COVID-19 infection) on the nervous system especially sensory nerves where the virus causes loss of taste and smell as it’s known, and may affect auditory nerves and be the expected cause of some hearing problems. A case-control analytic study was performed on a connivance sample of society of university students from a medical faculty. Each participant filled out a questionnaire contains demographic data and general, auditory and respiratory health condition, in addition to vaccination status. In the other side, the audio- examinations were performed on the study sample including Pure Tone Audiometry (PTA) and tympanometry. Two statistical methods; chi-square and t-test were used to interpret the correlation.  It is noticeable that there is no clear link between the thresholds and the vaccination status. This is contrary to some studies that found that the vaccine may have a very slight influence on hearing thresholds. This can be explained by the fact that is the small (significant) p values ​​in both methods was spread in a various and random manner, and it can be said that there is a possible effect, but it is not clear nor regular. A more comprehensive studies are required to establish this relationship between the hearing threshold and the COVID-19 vaccine.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تأثير القدرة الإدارية في إستدامة الأرباح المحاسبية: بالتطبيق على عينة من شركات القطاع الصناعي المدرجة في سوق العراق للأوراق المالية
...Show More Authors

The research aims to measure the impact of managerial ability on income persistence for the industrial sector companies listed in the Iraqi Stock Exchange. The managers of these companies have managerial ability that may have an impact on achieving their objectives, setting their future policies and investing opportunities. Which may be reflected in many areas, including the level of profitability achieved and the possibility of continuity or sustainability? A model was used to measure managerial ability as well as a model to measure the income persistence in order to determine the relationship between them, The researchers found the absence of a statistically significant between managerial ability and the income persistence, which requi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
مجلة الفارابي للعلوم النسانية
اثر استراتيجية نجمتين وامنية في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسط م . د . انور عباس محمد
...Show More Authors

يهدف البحث الى التعرف على اثر استراتيجية نجمتين وامنية في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسطولتحقيق هدف البحث تم اتباع المنهج التجريبي ذو الضبط الجزئي وتم تحديد مجتمع البحث بطلاب الصف الثاني المتوسط لجميع المدارس الثانموية والمتوسط التابعة لمديرية تربية الكرخ الثانية وتم اخنيار احد هذه المداس بصورة قصدية لتطبيق تجربة ابلبحث الحالي

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref