Preferred Language
Articles
/
vxeWNY8BVTCNdQwCJ2Gf
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 01 2021
Journal Name
Biochem. Cell. Arch.
AGE AND GENDER IMPACT ON GLYCAEMIC CONTROL, RENAL FUNCTION AND OXIDATIVE STRESS PARAMETERS IN IRAQI PATIENTS TYPE 2 DIABETES MELLITUS
...Show More Authors

Type 2 daibetes mellitus (T2DM) is a global concern boosted by both population growth and ageing, the majority of affected people are aged between (40- 59 year). The objective of this research was to estimate the impact of age and gender on glycaemic control parameters: Fasting blood glucose (FBC), glycated hemoglobin (HbA1C), insulin, insulin resistance (IR) and insulin sensitivity (IS), renal function parameters: urea, creatinine and oxidative stress parameters: total antioxidant capacity (TAC) and reactive oxygen species (ROS). Eighty-one random samples of T2DM patients (35 men and 46 women) were included in this study, their average age was 52.75±9.63 year. Current study found that FBG, HbA1C and IR were highly significant (P<0.01) inc

... Show More
Preview PDF
Scopus (6)
Scopus
Publication Date
Tue Dec 03 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
New adaptive satellite image classification technique for al Habbinya region west of Iraq
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Veterinary Medicine International
Compensatory Structural Adaptive Modifications of Vagina in Response to Functional Demand in Goat
...Show More Authors

Vaginal biopsies and smears were collected from ten adult local healthy goats. Routine histological methods were carried out on vaginal biopsies and then stained with PAS stain. The smears were stained with Methylene blue. All samples were inspected under light microscope. The present study found that many constituents of the wall of the vagina, which have an important functional role, were absent; among these were the vaginal glands, goblet cells, muscularis mucosa, and lymphatic nodules. On the other hand, vagina showed special compensatory histological mechanisms, namely, the deep epithelial folds, the well-developed germinated stratum basale, the apparent basement membrane, and the profuse defensive cells, such as neutrophils, m

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Tue Mar 10 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref