Preferred Language
Articles
/
jih-25
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have unique characteristics. A program has been produced in the Visual Basic environment. The goal of this program is to get the computer characteristics and merge them with human characteristics to produce powerful algorithms of authentication and authorization can be used to protect the resources that are stored in the computer networks environments through the creation of software modules and interactive interfaces to accomplish this purpose.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Effect of some Factors on Human Peripheral Lymphocyte Cytogenetics In Pesticide ExXPOSED GROUPS
...Show More Authors

The effect of smoking, age and exposure duration in pesticide risk groups were studied > Groups were all men and included farmers (25), pesticide sellers (25), pesticides manufacture workers (Al-Tark factory for agricultural pesticide production) (25), Control group (25) were from Baghdad university staff (living in Baghdad city) > The cytogenetic parameters studied were Chromosomal aberrations (CA), induction of micronuclei (Mn)formation .Results revealed that smoking synergized pesticides exposure in induction of structural CAs in all groups with significant differences (P<0.01) and the worst effect recorded in workers , the increment was more than folds the level of control group (0.68) for the non smokers and was 5.78 times (control gr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of Drug Metabolism And Pharmacokinetics
Effects of Human Sulfotransferase 2A1 Genetic Polymorphisms 3 on the Sulfation of Tibolone
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
2018 Tenth International Conference On Advanced Computational Intelligence (icaci)
On high-level control of power-augmentation lower extremity exoskeletons: Human walking intention
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Bioequivalence of Two Formulations of Amoxicillin in Human Healthy Volunteers on (HPLC) Technique
...Show More Authors

Amoxicillin is commercially available in the form of capsules and tablets containing 250mg or 500mg for oral administration. It is also available in the form of suspension containing "25mg/ml” . Amoxicillin is presently used as the most common antibiotics .Ten healthy Human volunteers were characterized respected to their pharmacokinetic and bioavailability of two formulations of Amoxicillin from two sources of  industrial companies  after a single dose administration was given orally. A procedure is described for determination the concentration levels of Amoxicillin in human plasma of healthy volunteers using high performance liquid chromatography (HPLC) with reversed-phase isocratic column at low wave length of UV-visib

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The human sense organs and it's significance In the great Qur'an: The human sense organs and it's significance In the great Qur'an
...Show More Authors

Abstract:
Thanks for people's God who brought the great book, prays and peace for
his prophet "Mohammad" the master of missioners to all people.
Allah created human being in it's best way and give him a soul thus ,
he will be a human with faith that has movement and life and the centre of his
soul is the sense which differentiate human from other animals. This
sensation generated from different senses that made the soul.
God had given him a protected heart, talkative tounge and clear seeing
to understand with consideration, so he will prevent himself of falling in wrong
by thinking and situation that he will pass by.
The significance and probability of sensation had talken our attention in
Qur'an . Hence

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 13 2023
Journal Name
Diagnostics
The Effect of a Bioactive Oral System and CO2 Laser on Enamel Susceptibility to Acid Challenge
...Show More Authors

This study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More