Preferred Language
Articles
/
iBfgNY8BVTCNdQwCQmJX
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

Crossref
View Publication
Publication Date
Fri Oct 12 2018
Journal Name
International Journal Of Medical Research & Health Sciences
A Comparison of Fear Levels of Endodontic Treatment in Iraqi Population
...Show More Authors

Introduction: Dental fear is defined as the patient’s specific reaction towards stress related to dental treatment in which the stimulus is unkn..

View Publication Preview PDF
Publication Date
Mon Apr 19 2021
Journal Name
Archives Of Razi Institute
Gene Expression of miRNAs Let-7aAssociated with Diabetes in Iraqi Population
...Show More Authors

miRNAs regulate protein abundance and control diverse aspects of cellular processes and biological functions in metabolic diseases, such as obesity and diabetes. Lethal-7(Let-7) miRNAs specifically target genes associated with diabetes and have a role in the regulation of peripheral glucose metabolism. The present study aimed to describe the gene expressions of the let-7a gene with the development of diabetes in Iraq and the difference in the expression of this gene in patients with diabetes and healthy individuals. The association between age and gender with the development of diabetes was studied in this study and the results were compared with those of healthy individuals in the group of control. Based on the obtained results, there was

... Show More
Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
The Iraqi Journal Of Agricultural Sciences
A FORMULA TO PREDICT INBREEDING DEPRESSION IN F2 POPULATION OF MAIZE
...Show More Authors

A field experiment was conducted on the form of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad in spring and fall seasons of 2009 and 2010 . Ten inbreds of maize were planted and crossed to each other to produce single crosses . In the second season, single crosses were planted along with thin parent to produce three – way and double crosses . In the third seasons panet and crosses were planted . Crosses were selfed to produce F2 seeds and increase seeds of inbreds . In the fourth season, all grin types were planted , and their agronomic traits were evaluated . Values of P of inbreds , F1 and F2 were calculated for agronomic traits . The new formula to predict inbreeding depression ( ID ) F2 plant without gr

... Show More
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the esthetic smile in a sample of Iraqi population
...Show More Authors

Background: The aim of the present study is to evaluate the esthetic smile in sample of Iraqi adults and to assess the gender differences. Materials and Methods: 100 persons (50malesand 50 females had class I normal dental and skeletal selected for this study.Clinical examination and digital photograph with posed smile were performed for each individual. Six linear soft tissue parameters in each photograph using AutoCAD program 2011. Five visual and four quantitative evaluations of the smile were studied for eachsubject. The smile arch and index, buccal corridor spaces (BCSs) were studied.Descriptive statistics of the measurements were calculated. Independent student’s ttestswere used to evaluate the gender differences. Statistics: Desc

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref