Preferred Language
Articles
/
KBdKXo8BVTCNdQwCO3S6
Water quality monitoring of Al-Habbaniyah Lake using remote sensing and in situ measurements
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Nov 10 2020
Journal Name
Journal Of Arts, Literature, Humanities And Social Sciences
Análisis de los textos deportivos españoles y su traducción al تحليل النصوص الرياضية الاسبانية و ترجمتها الى العربية
...Show More Authors

View Publication
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Cooling Load Calculations For Typical Iraqi Roof And Wall Constructions Using Ashrae's RTS Method
...Show More Authors

The present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials.  Good agreement between the average theoretical and measured cooli

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Partial Least Square Regression(PLSR) and Tree Regression by Using Simulation(RT).
...Show More Authors

This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 07 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI Images using superpixels based split and Merge algorithm
...Show More Authors

RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2

View Publication