Preferred Language
Articles
/
yBeEMI8BVTCNdQwCdF9n
Apexification and Periapical Healing of Immature Teeth Using Mineral Trioxide Aggregate
...Show More Authors

Crossref
View Publication
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 25 2022
Journal Name
Iraqi Journal Of Science
PIM-SM based Multicast Comparison for IPv4 verses IPv6 using GNS3 and JPERF
...Show More Authors

The multicast technology implements a very high-efficiency point-to-multipoint data transmission over IP networks (IPv4 and IPv6). Multicast reduces network load, eliminates traffic redundancy, and saves network bandwidth. Therefore, multicast used widely in LAN/WAN applications such as online games, video conferencing and IPTV. The multicast technology implements varied protocols such as DVMRP(Distance Vector Multicast Routing Protocol), MOSPF(Multicast Open Shortest Path First), or PIM-DM (Protocol Independent Multicast- Dense Mode) which considered source tree type, while PIM-SM (Protocol Independent Multicast- Sparse Mode) and CBT (Core Based Tree) uses shared tree. Current paper focuses on the performance evaluation of the two multi

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Tree regression (TR), and Negative binomial regression (NBR) by Using Simulation.
...Show More Authors

            In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Qurain AL-Thamad Valley Hydrological Aspects Extraction Using Remote Sensing and GIS Techniques
...Show More Authors

In the arid to semi-arid lands the extracted hydrological features are essential ones, since their effect on water projects managing, agricultural projects administrating, and animals grazing, so that this research is considered to be vital research because the climate of Qurain AL-Thamad basin is arid climate and basin region inhabited by many tribes who works in agricultural and grazing fields. The illustration of hydrological features using morphometric analyses is optimum since the quantization issue of basin factors, in the past this would be difficult using classical procedures (i.e. using paper topographic maps and planmeter). Recently as in this work modern procedures has been used (i.e. satellite imagery DEM as ancillary image a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
WiMax Network Design and Simulation for Middle Technical University Campus Using OPNET Modeler
...Show More Authors

     This study aims to build a wireless computer network for a large company or university to enhance mobility and allow university users to stay connected at any time or place, which is achieved by applying the Universal Interoperability for Microwave Access (WiMax) technology. WiMax is based on the 802.16 sets of standards and has the most efficient and advanced hardware capabilities to meet the demands of teachers and students to browse the web or download files quickly. OPNET Modeler version 14.5 was used to determine the quality of service parameters of WiMax.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Sequence Variation and Phylogenetic Relationships Among Ten Iraqi Rice Varieties Using RM171 Marker
...Show More Authors

In the present study rice microsatellite marker (RM 171) was used to evaluate the genetic diversity and determining cultivar identity among ten rice varieties (oryza sativa L.) (Seven local and three commercial varieties). PCR technique was performed using two specific primers. The result showed presence of a band (305bp) DNA sequencing was done to PCR product to detect sequence variation between the ten rice varieties. In order to detect the relationship among all varieties, alignment of RM171 marker sequence was carried out for each variety. Amber and Daawat varieties showed the highest similarity with 98% identity, while the difference (2%) consists of two gaps and two transition mutations (T/C) and (C/T). Furthermore, Amber was align

... Show More
View Publication Preview PDF