Preferred Language
Articles
/
ijl-56
Tissue Welding Using (800±10nm) Diode and (1064nm) Nd: YAG Lasers
...Show More Authors

Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Results: Welding of sheep intestine had been achieved by Nd-YAG laser 1064 nm at 400 and 500 mJ and PRR 4Hz, using human albumin 20% as a solder. Welding failed using the diode laser 4W for 10 min with albumin and indocyanine green. Conclusion: Laser may be useful tool in certain condition for joining tissue and wound closure. This is important because in certain circumstances no other technique is feasible for wound closure.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Semi-Analytical Assessment of Magneto-Hydrodynamic Nano-Fluid Flow Jeffrey- Hamel Problem
...Show More Authors

In this paper, analyzing the non-dimensional Magnesium-hydrodynamics problem Using nanoparticles in Jeffrey-Hamel flow (JHF) has been studied. The fundamental equations for this issue are reduced to a three-order ordinary differential equation. The current project investigated the effect of the angles between the plates, Reynolds number, nanoparticles volume fraction parameter, and magnetic number on the velocity distribution by using analytical technique known as a perturbation iteration scheme (PIS). The effect of these parameters is similar in the converging and diverging channels except magnetic number that it is different in the divergent channel. Furthermore, the resulting solutions with good convergence and high accuracy for the d

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Simultaneous Determination of Binary Mixture of Estradiol and Progesterone Using Different Spectrophotometric Methods
...Show More Authors

Four rapid, accurate and very simple derivative spectrophotometric techniques were developed for the quantitative determination of binary mixtures of estradiol (E2) and progesterone (PRG) formulated as a capsule. Method I is the first derivative zero-crossing technique, derivative amplitudes were detected at the zero-crossing wavelength of 239.27 and 292.51 nm for the quantification of estradiol and 249.19 nm for Progesterone. Method II is ratio subtraction, progesterone was determined at λmax 240 nm after subtraction of interference exerted by estradiol. Method III is modified amplitude subtraction, which was established using derivative spectroscopy and mathematical manipulations. Method IIII is the absorbance ratio technique, absorba

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 14 2022
Journal Name
Journal Of Craniofacial Surgery
The Effect of The Blue-Violet Light Emitting Diode (Led) Irradiation on the Bleeding and Pain Following Tooth Extraction
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Feb 26 2024
Journal Name
Journal Of Contemporary Medical Sciences
The Validity of Computed Tomography Guided Lung Tru- cut Biopsies in Achieving Accurate Tissue Results
...Show More Authors

Objective: This study aims to assess the efficacy of CT-guided true-cut biopsy as a less invasive and cost-effective diagnostic technique for peripherally placed lung lesions.   Methods: fourty patients with solitary lung nodule were involved in this study, true cut biopsies under Ct guide was taken then processed for routine H&E staining.   Results: different pathological features can be identified with different pathological features giving primary diagnostic screening for lung cancer   Conclusion: CT guided thoracic lesion biopsy is very efficient, cost-effective and less invasive technique when compared with the thoracic surgery

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Aug 30 2021
Journal Name
Russian Electronic Journal Of Radiology
THE ROLE OF APPARENT DIFFUSION COEFFICIENT VALUE IN DIFFERENTIATING BENIGN FROM MALIGNANT SOFT TISSUE MASSES
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Feb 05 2024
Journal Name
J Contemp Med Sci | Vol. 10, No. 1, January–february 2024: 77–79
The Validity of Computed Tomography Guided Lung Tru-Cut Biopsies in Achieving Accurate Tissue Results
...Show More Authors

Objective: This study aims to assess the efficacy of CT-guided true-cut biopsy as a less invasive and cost-effective diagnostic technique for peripherally placed lung lesions.