Preferred Language
Articles
/
ijs-1802
Approximate Solutions for Systems of Volterra Integro-differential Equations Using Laplace –Adomian Method
...Show More Authors

Some modified techniques are used in this article in order to have approximate solutions for systems of Volterra integro-differential equations. The suggested techniques are the so called Laplace-Adomian decomposition method and Laplace iterative method. The proposed methods are robust and accurate as can be seen from the given illustrative examples and from the comparison that are made with the exact solution.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Optimal Control Problem To Robust Nonlinear Descriptor control Systems with Matching Condition
...Show More Authors

Abstract

    In this paper, the solutions to class of robust non-linear semi-explicit descriptor control systems with matching condition via optimal control strategy are obtained. The optimal control strategy  has been introduced and  developed in the sense that, the optimal control  solution is robust solution to the given non-linear uncertain semi-explicit descriptor control system. The necessary mathematical proofs and remarks as well as  discussions are also proposed. The present approach is step-by-step illustrated by application example to show its effectiveness a and efficiency to compensate  the structure uncertainty in the given semi-explicit (descriptor) control

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 07 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Antibacterial effects of mineral trioxide aggregate and Biodentine TM after the addition of different concentrations of black seed aqueous solutions
...Show More Authors

Background: Mineral Trioxide Aggregate (MTA) and BiodentineTM cements are new materials with numerous exciting clinical applications. Both have appreciable properties which include good physical properties and the ability to stimulate tissue regeneration as well as good antibacterial effects. The aim of this study was to investigate and compare the antibacterial effects of MTA and BiodentineTM, when they were mixed with different concentrations of aqueous solutions of Black Seed extract, against Enterococcus faecalis. Materials and methods: MTA and BiodentineTMwere prepared according to the manufacturer’s instructions. The method of Mawlood was followed to prepare the Black Seed aqueous solution. Agar diffusion method on Brain Heart

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 12 2017
Journal Name
Iraqi Journal Of Laser
A Comparative Evaluation of Post-Operative Pain and Function after Gingival Depigmentation Using 940 Nm Diode Laser And Conventional Bur Method: 6 Months Study
...Show More Authors

The aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Quasi-Hadamard products of New Subclass of Analytic Functions of β-Uniformly Univalent Function Defined by Salagean q-Differential Operator
...Show More Authors

In this paper, we show many conclusions on the Quasi-Hadamard products of new Subclass of analytic functions of β-Uniformly univalent function  defined by Salagean q-differential operator.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation Interleukin ─ 8 and High Sensitivity C - Reactive Protein in Sera of Control Group and Human Female Patients with Osteoarthritis Nodal in Iraqi's Patients
...Show More Authors

       The present study conducted on 30 female patients with osteoarthritis OA a attending Baghdad teaching hospital, in addition to 30 healthy females, all subjects were (35-65) year's old .Parameters were measured in the sera of patients group and healthy groups were interleukin -8 (IL-8) and high sensitivity C-reactive protein (hs-CRP).The results revealed a higher significant in all parameters of patients sera compared to healthy groups. Conclusion was obtained that IL-8 and hs- CRP were a markers or player inflammatory disease like osteoarthritis nodal  

 

View Publication Preview PDF
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More