Preferred Language
Articles
/
kBflL48BVTCNdQwC2V4k
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING CLASSIFIERS COMBINATION
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Oct 18 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM

... Show More
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Fast Lossless Compression of Medical Images based on Polynomial
...Show More Authors

In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Aug 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Low Level Laser (LLL for Treatment of Infected Mice with Carcinoma by Activating the Lymph Node Action without Drugs
...Show More Authors

Regional immune response with mammary gland carcinoma was
studied statistically. However, the prognostic value remains
conflicting. Thirty mice were used in this study which infected
were with mammary gland carcinoma. The tumor size of the animals
under study were measured before and after laser irradiation by using
a vernier and compared these results were with that of non irradiated
animals with laser (control group)
The aim of this study was to evaluate the effect of low level laser
therapy (LLLT) on increasing the response of immune system by
stimulating the lymph node action to decrease the cancer cell activity
and then decreasing the tumor size of an infected mice.
The results of the gross observati

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

Background: Poly (methyl methacrylate) has several disadvantages (poor mechanical properties) like impact and transverse strength. In order to overcome these disadvantages, several methods were used to strengthen the acrylic resin by using different fibers or fillers. This study was conducted to evaluate the effect of Plasma treatment of the fiber on mechanical properties Poly (methyl methacrylate) denture base material. Materials and methods: Specimens were prepared from poly methyl metha acrylic (PMMA) divided according to present of fiber into 4 groups (first group without fiber as control group, second group with Plasma treated polyester fibers, third group with Plasma treated polyamide fibers and fourth group Plasma treated combination

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Clinical Evaluation of Melatonin Alone and in Combination with Pizotifen in the Prophylaxis of Migraine
...Show More Authors

The treatment of migraine headache targets the neurovascular mechanism and involves the use of serotonin receptor antagonists. Some of these drugs are used for the treatment of acute attacks; while others are effective as prophylactic measures to decrease the duration and frequency of attacks. Pizotifen, a 5-HTA antagonist, is one of the prophylactic drugs for which the clinical use resulted in low outcomes in reducing migraine symptoms. Melatonin, a serotonin derived neurohormone, was reported to exert many functions like sleep induction, anti-inflammatory, neurovascular regulation, cytoprotection and modulation of neurotransmitter release.  In the view of the involvement of serotonin in the pathophysiology of migraine a

... Show More
View Publication Preview PDF
Crossref