Preferred Language
Articles
/
ijl-141
The Inhibition of Streptococcus mutans by He- Ne Laser via TBO Photosensitizer
...Show More Authors

This work aims to investigate the inhibition of vitality of Streptococcus mutans, which is the causative agent of caries. A 632.8 nm He-Ne laser with the output power of 4.5mW was used in combination with toluidine blue O (TBO) at the concentration of 50μg/ml as a photosensitizer. Streptococcus mutans was isolated from 35 patients if carious teeth. Three isolates were chosen and exposed to different energy densities of He – Ne laser light 3.8, 11.7, 34.5 and 104.1 J/cm². After irradiation, substantial reduction was observed in the number of colony forming units (CFU)/ ml. The reduction in the number of CFU was increasing as the dose increased.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
حول أسلوب تحليل التغاير المتعدد باستخدام تصميم قطع منشقة
...Show More Authors

Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.

By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.

We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.

There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.

Key Word: Analysis of variatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Choosing the best method for estimating the survival function of inverse Gompertz distribution by using Integral mean squares error (IMSE)
...Show More Authors

In this research , we study the inverse Gompertz distribution (IG) and estimate the  survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes

View Publication
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
The Effect of The Illustration Program on Fashion Design Inspired by Historical Costumes: تهاني ناصر العجاجي -هدى عبد العزيز المقرن
...Show More Authors

This research aims to identify the role and impact of illustrations in contemporary fashion design inspired by historical costumes. Historical fashion aesthetics are adapted to design drawings. The experimental method was followed and a sample of 31 students in the department of fashion and textile design, third level were selected. Each student carried out two original historical and contemporary design. The models were executed two times: one with the usage of the program and the other without program help. The tools that were used are the program, the scale, the pre-skill test, and the post-skill test. One of the most relevant results of the research is the possibility of using historical costumes to highlight creativity and innovatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Balancing the Multi Assembly line Using Ranked Positional Weight and COMSOAL Algorithms: Case Study at the Sewing line Factory (7) /the General Company for Leather Industries (GCLI/ Baghdad)
...Show More Authors

      The problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni

... Show More
View Publication Preview PDF
Crossref