Preferred Language
Articles
/
rxclNo8BVTCNdQwC4WLS
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Aug 09 2015
Journal Name
No
Stability and Instability of Some Types of Delay Differential Equations
...Show More Authors

Publication Date
Wed Sep 04 2024
Journal Name
F1000research
Posterior palatal seal recording: fact and reasons among Iraqi dentists
...Show More Authors

Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Serum and Testicular Testosterone Levels of Ram Lamb during Puberty
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Pharmacy Education
Students' experience and evaluation of community pharmacy internship in Iraq
...Show More Authors

Background: Pharmacy internship programmes are driven by most developed countries to outweigh the ongoing growth in the pharmacy career which encourages pharmacists to play a significant role as healthcare providers.    Objectives: This study examines pharmacy students' perception, satisfaction, challenges, and limitations with the internship curriculum.    Method: A cross-sectional study was conducted using an online survey with different elements to examine students' perceptions of various aspects.    Result: Most students reported a positive impression regarding their internships, however, they were less satisfied with the allowance for filling prescriptions and compounding also, the college's follow-up was inadequate. F

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2012
Journal Name
First Eage Workshop On Iraq - Hydrocarbon Exploration And Field Development
Microfacies and Petrographic study for Yamama formation in Ratawi field
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
Postmodernism and Technology in Don Delillo's Novel The White Noise
...Show More Authors

This paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac

... Show More
View Publication
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref