Search Results - "Kadhim, Aláa"
-
1
Comparative Evaluation of Marginal Microleakage Between Bulk-Fill, Preheated Bulk-Fill, and Bulk-Fill Flowable Composite Resins Above and Below Cemento-Enamel Junction Using Micro-Computed Tomography: An In Vitro Study
Published in Dental hypotheses (01-10-2022)“…Objective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above…”
Get full text
Journal Article -
2
Synthesis and Aggregation of a Porphyrin-Cored Hyperbranched Polyglycidol and Its Application as a Macromolecular Photosensitizer for Photodynamic Therapy
Published in Molecular pharmaceutics (04-03-2019)“…Macromolecules are potentially useful delivery systems for cancer drugs, as their size allows them to utilize the enhanced permeability and retention effect…”
Get full text
Journal Article -
3
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications
Published in IEEE access (2021)“…Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital…”
Get full text
Journal Article -
4
Workplace stress among healthcare workers in Kut city, Iraq, 2020
Published in Journal of the Pakistan Medical Association (01-09-2023)“…Objective: To identify workplace stress in healthcare workers.Method: The cross-sectional, descriptive study was conducted at Al-Kut and Al-Karamah hospitals…”
Get full text
Journal Article -
5
Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
Published in Journal of intelligent systems (23-04-2024)“…Network security faces increasing threats from denial of service (DoS) and distributed denial of service (DDoS) attacks. The current solutions have not been…”
Get full text
Journal Article -
6
Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System
Published in IEEE access (2021)“…The security strengths of block ciphers greatly rely on the confusion components which have the tendency to transform the data nonlinearly into the perplexed…”
Get full text
Journal Article -
7
Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder
Published in Entropy (Basel, Switzerland) (01-10-2019)“…Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature…”
Get full text
Journal Article -
8
Enhancement of QR Code Capacity by Encrypted Lossless Compression Technology for Verification of Secure E-Document
Published in IEEE access (2020)“…This paper provides a novel method to improve the data storage of a quick response code (QR code) by applying encrypted lossless compression technology. QR…”
Get full text
Journal Article -
9
Assessment of immunization session practices in primary health care centers in Al-Najaf province
Published in Journal of public health in Africa (01-09-2023)“…Immunization has played a vital role in improving global health by reducing the transmission of infectious diseases. To ensure the successful implementation of…”
Get full text
Journal Article -
10
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
Published in Sensors (Basel, Switzerland) (05-11-2022)“…Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication…”
Get full text
Journal Article -
11
A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model
Published in IEEE access (2019)“…This paper investigates the dynamics of a 3D plasma system that has a single symmetric double-wing attractor moving around symmetric equilibria. Therefore, it…”
Get full text
Journal Article -
12
Optimization of Potato Cultivation Through the Use of Biostimulator Supporter
Published in Agronomy (Basel) (01-10-2024)“…Seed potato treatment is vital for plant protection, yield enhancement, and product quality. In the conducted research, the plant biostimulator Supporter was…”
Get full text
Journal Article -
13
Synchronization and different patterns in a network of diffusively coupled elegant Wang–Zhang–Bao circuits
Published in The European physical journal. ST, Special topics (01-12-2022)“…Synchronization in coupled oscillators is of high importance in secure communication and information processing. Due to this reason, a significant number of…”
Get full text
Journal Article -
14
Enhancement AES based on 3D Chaos Theory and DNA Operations Addition
Published in Karbala international journal of modern science (05-07-2019)“…The techniques modern used to encrypt text data play an important role in preventing unauthorized access. The AES algorithm is widely used in various…”
Get full text
Journal Article -
15
Image Encryption Based on Local Fractional Derivative Complex Logistic Map
Published in Symmetry (Basel) (01-09-2022)“…Local fractional calculus (fractal calculus) plays a crucial role in applications, especially in computer sciences and engineering. One of these applications…”
Get full text
Journal Article -
16
Fast Novel Efficient S-Boxes with Expanded DNA Codes
Published in Security and communication networks (2023)“…IoT is one of the most popular technologies in recent years due to the interconnection of various infrastructures, physical devices, and software. To guarantee…”
Get full text
Journal Article -
17
Optimized ensemble model for wind power forecasting using hybrid whale and dipper-throated optimization algorithms
Published in Frontiers in energy research (21-06-2023)“…Introduction: Power generated by the wind is a viable renewable energy option. Forecasting wind power generation is particularly important for easing supply…”
Get full text
Journal Article -
18
A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document
Published in IEEE access (2020)“…MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection…”
Get full text
Journal Article -
19
Effect of speed sintering process on the microstructure, flexural strength and translucency of zirconia
Published in Heliyon (30-09-2024)“…To determine the impact of the speed sintering program on the microstructure, flexural strength and translucency of zirconia in comparison with those of the…”
Get full text
Journal Article -
20
Comparative Evaluation of the Radiographic Density of GuttaFlow® 2 in Different Obturation Techniques Using Spiral Computed Tomography
Published in Journal of the college of dentistry (15-12-2018)“…Background: Ideal root canal obturation depends on many factors; one of them is good sealing of root canal without pores. The aim of this study was to…”
Get full text
Journal Article