Preferred Language
Articles
/
xhfC-I8BVTCNdQwCdYHa
Results for the Groups SL(2,34 ) and SL(2,36 )
...Show More Authors

Publication Date
Sun Jul 01 2012
Journal Name
2012 International Symposium On Innovations In Intelligent Systems And Applications
Edge detection for fast block-matching motion estimation to enhance Mean Predictive Block Matching algorithm
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Comparative Medicine
Model of traumatic spinal cord injury for evaluating pharmacologic treatments in cynomolgus macaques (Macaca fasicularis)
...Show More Authors

Here we present the results of experiments involving cynomolgus macaques, in which a model of traumatic spinal cord injury (TSCI) was created by using a balloon catheter inserted into the epidural space. Prior to the creation of the lesion, we inserted an EMG recording device to facilitate measurement of tail movement and muscle activity before and after TSCI. This model is unique in that the impairment is limited to the tail: the subjects do not experience limb weakness, bladder impairment, or bowel dysfunction. In addition, 4 of the 6 subjects received a combination treatment comprising thyrotropin releasing hormone, selenium, and vitamin E after induction of experimental TSCI. The subjects tolerated the implantation of the recording devi

... Show More
Scopus (6)
Scopus
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Pakistan Journal Of Medical & Health Sciences
Application of program for nurse’s management about care of children treated with Ventricular Peritoneal Shunt
...Show More Authors

Publication Date
Sat Jun 08 2024
Journal Name
Karbala International Journal Of Modern Science
Designing of Human Serum Albumin Nanoparticles for Drug Delivery: a Potential Use of Anticancer Treatment
...Show More Authors

Human serum albumin (HSA) nanoparticles have been widely used as versatile drug delivery systems for improving the efficiency and pharmaceutical properties of drugs. The present study aimed to design HSA nanoparticle encapsulated with the hydrophobic anticancer pyridine derivative (2-((2-([1,1'-biphenyl]-4-yl)imidazo[1,2-a]pyrimidin-3-yl)methylene)hydrazine-1-carbothioamide (BIPHC)). The synthesis of HSA-BIPHC nanoparticles was achieved using a desolvation process. Atomic force microscopy (AFM) analysis showed the average size of HSA-BIPHC nanoparticles was 80.21 nm. The percentages of entrapment efficacy, loading capacity and production yield were 98.11%, 9.77% and 91.29%, respectively. An In vitro release study revealed that HSA-BIPHC nan

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 Ieee 56th Annual Conference On Decision And Control (cdc)
Hierarchical non-singular terminal sliding mode controller for a single link flexible joint robot manipulator
...Show More Authors

—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t

... Show More
View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Ovonic Research
Effect of dopant of aluminum on the structural and optical properties of NiTsPc thin films
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Calculation and study of internal radiation doses resulting from the ingestion of some radioactive sources
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jul 03 2017
Journal Name
University Of Sheffield
The interaction of Porphyromonas gingivalis with host epithelial cells and its relevance to periodontal disease
...Show More Authors

Periodontitis is one of the most prevalent bacterial diseases affecting man with up to 90% of the global population affected. Its severe form can lead to the tooth loss in 10-15% of the population worldwide. The disease is caused by a dysbiosis of the local microbiota and one organism that contributes to this alteration in the bacterial population is Prophyromonas gingivalis. This organism possesses a range of virulence factors that appear to contribute to its growth and survival at a periodontal site amongst which is its ability to invade oral epithelial cells. Such an invasion strategy provides a means of evasion of host defence mechanisms, persistence at a site and the opportunity for dissemination to other sites in the mouth. However, p

... Show More
View Publication