Preferred Language
Articles
/
aRc3RI8BVTCNdQwC5mj3
Ideals of the full transformation semigroup of a free left G-act on n-generators
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Carbon Fiber Volume Fraction and their Orientations on the Thermal Conductivity of the Polymer Composite Materials.
...Show More Authors

      The effect of fiber volume fraction of the carbon fiber on the thermal conductivity of the polymer composite material was studied. Different percentages of carbon fibers were used (5%, 10%, 15%, 20%, and 25%). Specimens were made in two groups for unsaturated polyester as a matrix and carbon fibers, first group has parallel arrangement of fibers and the second group has perpendicular arrangement of fibers on the thermal flow, Lee's disk method was used for testing the specimens. This study showed that the values of the of thermal conductivity of the specimens when the fibers arranged in parallel direction was higher than that when the fibers arranged in the perpendicular direction  

 &nbsp

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
The Effect of the Solution Heat Treatment on the Mechanical Properties of Aluminum-Copper Alloy (2024-T3) Using Rolling Process
...Show More Authors

The effect of solution heat treatment on the mechanical properties of Aluminum-Copper alloy. (2024-T3) by the rolling process is investigated. The solution heat treatment was implemented by heating the sheets to 480 C° and quenching them by water; then forming by rolling for many passes. And then natural aging is done for one month. Mechanical properties (tensile strength and hardness) are evaluated and the results are compared with the metal without treatment during the rolling process. ANSYS analysis is used to show the stresses distribution in the sheet during the rolling process.  It has been seen that good mechanical properties are evident in the alloy without heat treatment due to the strain hardening and also the mechanical

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Economics And Finance Studies
THE IMPACT OF THE AUDIT COMMITTEE AND AUDIT TEAM CHARACTERISTICS ON THE AUDIT QUALITY: MEDIATING IMPACT OF EFFECTIVE AUDIT PROCESS
...Show More Authors

Scopus (33)
Scopus
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref