Preferred Language
Articles
/
uhjVyZcBVTCNdQwCQ5z3
Treatment of gray hair in vitiligo patients by direct melanocytes transplant using needling micrografting and dermabrasion techniques
...Show More Authors

KE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4

View Publication
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochem. Cell. Arch
A comparative study of amino acids in stomach regions of Felis catus (Domestic cat) and Sciurus carolinesis (Eastern gray squirrel)
...Show More Authors

Amino acids were analyzed in stomach regions of males & females of Felis catus (Domestic Cat) & Sciurus carolinesis (Eastern Gray Squirrel ), where it was stated that there are (18) amino acids as following : Aspartic acid (Asp), Glutamic acid (Gla), Serine (Ser), Arginine (Arg), Aspargine ( Asn), Cysteine (Cys), Alanine (Ala), Proline (Pro), Glyscine (Gly), Threonine (Thr), Tyrosine (Tyr), Valine (Val), Methionine (Met), Histidine ( His), Isoleucine (ile), Leucine (leu), Phenylalanine (Phe ) and Lysine (lys). Results have shown there are significant differences in concentration of amino acids between different region of stomach between males & females of Felis catus in part and between males & females of Sciurus carolinesis (Eastern Gray S

... Show More
Preview PDF
Scopus
Publication Date
Fri Feb 01 2013
Journal Name
Proceedings Of The Institution Of Civil Engineers - Ground Improvement
Treatment of collapse of gypseous soils by grouting
...Show More Authors

Gypseous soil is a collapsible soil, which causes large deformations in buildings that are constructed on it. Various methods have been used to minimise this effect, such as replacing the gypseous soil or using soil stabilisation (grouting or soil improvement). This study was carried out on four types of gypseous soils that have different properties and various gypsum contents. The testing was carried out on remoulded samples to evaluate the compressibility of gypseous soil under different conditions. The samples were grouted with acrylate liquid. The relationships between the injection pressure and the radius of flow, between time of injection and radius of flow, and between time and quantity of acrylate liquid are investigated on

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Evaluation of Nesfatin – 1 and Other Biochemical Markers in diabetic Neuropathy Iraqi patients before and after treatment with tegretol
...Show More Authors

Diabetic neuropathy is a form of nerve damage that can occur in people who have diabetes. High blood sugar (glucose) induced nerve damage in every part of the body. The nerves in the legs and feet were the most frequently affected. The extent to which a diabetic patient's body is impaired is calculated by the degree of nervosa harm.The purpose of this present study is estimation BMI,IL-10 , nesfatin-1 and HS-CRP in Iraqi DN patients before and after treatment via tegretol as well as it is the first study sheds light on the relationship between Nesfatin -1 and other parameters ( BMI,IL-10 and HS-CRP) also predication of Nesfatin-1 as a newly biomarker in patients with diabetic neuropathy. The present study consist of from 30 cohort G1 as hea

... Show More
Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
J Clin Exp Invest Www. Clinexpinvest. Org Vol
Oral zinc sulphate in treatment of patients with thallium poisoning: A clinical therapeutic trial
...Show More Authors

KE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref