Preferred Language
Articles
/
FRasmYcBVTCNdQwCXFgR
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

Crossref
View Publication
Publication Date
Sun Dec 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of the Rock Mechanical Properties Using Conventional Log Data in North Rumaila Field
...Show More Authors

Hydrocarbon production might cause changes in dynamic reservoir properties. Thus the consideration of the mechanical stability of a formation under different conditions of drilling or production is a very important issue, and basic mechanical properties of the formation should be determined.
There is considerable evidence, gathered from laboratory measurements in the field of Rock Mechanics, showing a good correlation between intrinsic rock strength and the dynamic elastic constant determined from sonic-velocity and density measurements.
The values of the mechanical properties determined from log data, such as the dynamic elastic constants derived from the measurement of the elastic wave velocities in the material, should be more a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of the Rock Mechanical Properties Using Conventional Log Data in North Rumaila Field
...Show More Authors

Hydrocarbon production might cause changes in dynamic reservoir properties. Thus the consideration of the mechanical stability of a formation under different conditions of drilling or production is a very important issue, and basic mechanical properties of the formation should be determined. There is considerable evidence, gathered from laboratory measurements in the field of Rock Mechanics, showing a good correlation between intrinsic rock strength and the dynamic elastic constant determined from sonic-velocity and density measurements. The values of the mechanical properties determined from log data, such as the dynamic elastic constants derived from the measurement of the elastic wave velocities in the material, should be more accurate t

... Show More
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological age estimation using third molars mineralization in a sample attending orthodontic clinics (A retrospective study)
...Show More Authors

Background: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.

Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Mar 02 2020
Journal Name
Journal Of Applied Research In Higher Education
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities parti

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 13 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Spectrum Analyzing X-ray Data Image (FITS) Using Ds9 Program
...Show More Authors

n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref