Preferred Language
Articles
/
WBZ9tIcBVTCNdQwC_lxW
Structural and Electrical Properties Dependence on annealing temperature of a-Ge: Sb/c-Si Heterojunction
...Show More Authors

Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Belief in the Last Day and its impact on building a Muslim's personality
...Show More Authors

 

Research Summary

        The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.

 Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.

        On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (230)
Crossref (176)
Scopus Clarivate Crossref
Publication Date
Sun Dec 24 2023
Journal Name
Journal Of The College Of Basic Education
Structural, Characterization, Biological and Studying the Enzyme Activity of some transition metal complexes with 4- )(2- hydroxy phenyl imino) methyl) -2, 6-dimethoxy phenol
...Show More Authors

A new Schiff bases ligand 4- ((2-hyolroxy phenylimino) methyl) -2, 6-dimethoxyphenol  derived from condensation of 2- amino phenol with 4-hydroxy -3, 5-dimethoxy benzaldehyde have been synthesized and characterized by  spectroscopy,  spectra, Mass spectrum and elemental microanalysis (C.H.N). Metal Complexes with ions have been also synthesized and characterized spectroscopic methods  spectroscopy, flame atomic absorption, molar conductivity measurements and magnetic susceptibility. These studies indicate that the moler ratio  for the complexes. The complexes  showed characteristics octahedral geometry with the (O,N) ligand coordinated in bidentate mode while with  showed square planer. The enzyme activity of the ligand and i

... Show More
View Publication
Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study of Thermophysical Properties of TiO2 Nanofluid
...Show More Authors

Titanium-dioxide (TiO2) nanoparticles suspended in water, and ethanol based fluids have been prepared using one step method and characterized by scanning electron microscopy (SEM), and UV–visible spectrophotometer. The TiO2 nanoparticles were added to base fluids with different volume concentrations from 0.1% to1.5% by dispersing the synthesized nanoparticles in deionized water and ethanol solutions. The effective thermal conductivity, viscosity and pH of prepared nanofluids at different temperatures from 15 to 30 oC were carried out and investigated. It was observed that the thermal conductivity, pH, and viscosity of nanofluids increases with the increase in TiO2 nanoparticle volume fraction

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref