Preferred Language
Articles
/
bsj-4875
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution
...Show More Authors

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the percentile estimator is the best in (E1, E2)  but modification moment is the best in (E3) . 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Some new properties of soft Lc-spaces
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparations of Organoclay Using Cationic Surfactant and Characterization of PVC/ (Bentonite and Organoclay) Composite Prepared via Melt Blending Method
...Show More Authors

Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively.  The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation, Characterization and Prophylactic Study of New Microsphere Containing Doxycycline against Diseases of Shrimp
...Show More Authors

Therapeutically and prophylactically using Microspheres containing doxycycline isolated from shell of shrimp. Low molecule weight poly lactic acid was prepared. In this study, Poly lactic acid (PLA)/ poly vinyl alcohol (PVA)/poly ethyleneglycol(PEG) loading doxycycline blend solutions was prepared. Also Poly lactic acid (PLA)-Tannin blend via solvent evaporation method was prepared. Microspheres of chitosan/gelatin microsphere loading doxycycline was prepared by emulsion crosslinking technique. Both microsphere and blends were characterized by Fourier transform infrared (FTIR) spectrophotometer. The FTIR spectra were shown distinguish bands. The in vitro release of doxcycline from its matrix at pH 7 was studied. The prophylactic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Synthesis of New Heterocyclic Compounds Derived from Anthrone and Evaluation of Their Biological Activity
...Show More Authors

In this research, Schiff bases derived from the reaction of anthrone with different heterocyclic amines have been described. The resulted Schiff base compounds were reacted with various nucleophiles in order to obtain new heterocyclic derivatives. Chemical structures of all products were confirmed by IR, 1H-, 13C-NMR spectral data and elemental analysis. All synthesized compounds were in vitro tested against a standard strain of pathogenic microorganism including Gram +ve bacteria (Staphylococcus aureus), Gram –ve bacteria (Escherichia coli), and fungi (Candida albicans).

View Publication Preview PDF
Crossref
Publication Date
Wed May 27 2015
Journal Name
Diyala Journal For Pure Science
Synthesis And Characterization Of Some New Metals Complexes Of [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide]
...Show More Authors

A new ligand [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide](MAA) was synthesized by reaction of 4-methoxybenzoylisothiocyanate with 3-aminoacetophenone,The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13CNMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MAA)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral

Publication Date
Tue Nov 14 2006
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
[PDF] من iasj.net Synthesis and Characterization of Some New Transition Metal Complexes of Amino
...Show More Authors

الوصف New complexes of Cu (ll), Ni (II)„Co (II), and Zn (ll) with 2-amino-5-p-Flouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(FT-IR)„UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested