Preferred Language
Articles
/
OBf_W5IBVTCNdQwCqK1P
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Biodiversity of Rotifera and Cladocera in the upper region of Euphrates River- Iraq
...Show More Authors

Five representative sampling stations were selected in upper region of Euphrates river. Bimonthly sampling were collected from December 2000 to December 2001. Rotifera showed high density in December 2000 while high density of cladocera which recorded in October .The results of relative abundance index showed that rotifera: Polyarthera dolichoptera , Keratella cochlearis , K. valga, Cephalodella auriculata and cladocera: Bosmina longirostris , B.coregoni ,Chydorus spharicus, were more abundant in study stations. The results of constancy index showed 4 taxa belonged to rotifera and 2 taxa belonged to cladocera which were considered constant in the Euphrates river, where the other species varied between accessory and accidental speci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Green Engineering
Sustainability and recovery project management implementation on construction projects in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Physics
Enhanced Mechanical Property of Acrylic Polymer/Graphene/Carbon Fibers Hybrid for Water Proof Coating
...Show More Authors

In this work, some mechanical properties of the polymer coating were improved by preparing a hybrid system containing Graphene (GR) of different weight percentages (0.25, 0.5, 1, and 2wt%) with 5wt% carbon fibres (CF) and added to a polymer coating by using casting method. The properties were improved as GR was added with further improvement on adding 5wt% of CF. The impact strength of acrylic polymer with GR increases with increasing weight ratio‏‏ of GR; maximum value was obtained when the polymer coating was incorporated with 1wt% GR and 5wt% CF. The impact strength of acrylic polymer with GR and GR/CF composites incorporated with GR at 1wt% and CF at 5wt%. Hardness increase with increasing weight ratio of Gr and a significant imp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Synthesis of ZnS Quantum Dots for QDs-LED hybrid device with different cathode materials
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological Evaluation of The Anatomic Characteristic of Lingual Foramina and Their Vascular Canals in The Anterior Region of The Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: presence of lingual vascular foramina and canals in the interforaminal regionmay increase the risk ofsurgical complications during implant placement or any surgical procedure in this area.Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended AL- Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canals

... Show More
View Publication
Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological Evaluation of the Anatomic Characteristic of Lingual Foramina and Their Vascular Canals in the Anterior Region of the Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: presence of lingual vascular foramina and canals in the interforaminal region may increase the risk ofsurgical complications during implant placement or any surgical procedure in this area. Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended Al-Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canal

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
The Effect of Internal Control in Supporting the Implementation of Cost Techniques in Iraqi Companies
...Show More Authors

In the last few years, there have been a lot of changes in the economy, society, and the environment. This has led to much competition between companies, directly and indirectly affecting production and marketing processes. Most companies are trying to cut production and manufacturing costs by using modern cost techniques such as product life cycle costing and Continuous Improvement (Kaizen) technology, in the method of measuring production costs or service costs, and the need for internal control to keep an eye on how these technologies are being used and how well they work. And to find out the effect of internal control on the implementation of costing techniques in Iraqi companies, 64 questionnaires were given to people who work in the i

... Show More
Scopus (5)
Scopus