Preferred Language
Articles
/
bsj-707
A new approach for the topical treatment of acne vulgaris by clindamycin HCL supported on kalion
...Show More Authors

Has been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (20)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (259)
Crossref (195)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The use of ionic pumping method for improving the performance of vacuum micro-electronic valves: The use of ionic pumping method for improving the performance of vacuum micro-electronic valves
...Show More Authors

Abstract
The use of electronic valves is commonly available. yet, the most
common is the techniques of communications as prod casting transmitter that
are used by these valves in addition to their use in communication tools as far
distance telephone, electronic measuring techniques , and others.
In this study, an attempt is endeavored for improving the efficiency of the
vacuum micro- valves(GI-19b) through activating their internal surfaces by the
use of ionic pumping which is used for treating valves which are out of order
(because of sedimentation some materials and oxide on its poles). The
existence of these materials and oxide increase the sum of current leakage
moving in between. The use of ionic pumpin

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adopting the green value chain to achieve sustainable competitive advantage: study to views of a sample from Ur General Company for Engineering Industries in Dhi Qar
...Show More Authors

       In light of the developments and intense competition that the world has witnessed, the need to search for a sustainable and continuous competitive advantage for economic units has emerged, as the economic units must not lose sight of their interest in the activities they perform to achieve that advantage, and it can be said that the goal of the research is to identify the theoretical dimensions of the green value chain represented by: (Green research and development, green design, green manufacturing, green marketing, green services) and the dimensions of the sustainable competitive advantage represented by (quality, creativity, innovation, cost, response to the customer), as well as identifyi

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 10 2020
Journal Name
Journal Of Advances In Mathematics
A Study of The Density Property in Module Theory
...Show More Authors

In this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.

Publication Date
Thu Oct 31 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
THE ROLE OF NANOTECHNOLOGY IN CROP IMPROVEMENT – A REVIEW
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 26 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE ROLE OF A PROTEAN CAREER IN HIGH PERFORMANCE
...Show More Authors

View Publication
Crossref