Preferred Language
Articles
/
ijp-261
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Gis Research Uk 24th Annual Conference
Comparing Open Source Map Data in Areas Lacking Authoritative Mapping
...Show More Authors

One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.

Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (17)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Tofiq Journal Of Medical Sciences
SYNTHETIC, SPECTROSCOPIC AND ANTIBACTERIAL STUDIES OF Co(II),Ni(II),Cu(II),Zn(II),Cd(II)AND Hg (II),MIXED LIGAND COMPLEXES OF TRIMETHOPRIME ANTIBIOTIC AND ANTHRANILIC ACID
...Show More Authors

Mixed ligand complexes of bivalent metal ions, viz ; M= Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition [M(Anth)2(TMP)] in 1:2:1 molar ratio, (where . AnthrH= Anthranilic acid (C7H7NO2) and Trimethoprime (TMP) = (C14H18N4O3) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity (Λm ),determination the percentage of the metal (M%) in the complexes by (AAS), FT-IR, magnetic susceptibility measurements [μeff (BM)] and electronic spectral data. The two ligands and their metal complexes have been screened for their bacterial activity against selected microbial strains (Gram +ve) & (Gram -ve).

Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Tofiq Journal Of Medical Sciences
SYNTHETIC, SPECTROSCOPIC AND ANTIBACTERIAL STUDIES OF CO(II),NI(II),CU(II),ZN(II),CD(II)AND HG (II),MIXED LIGAND COMPLEXES OF TRIMETHOPRIME ANTIBIOTIC AND ANTHRANILIC ACID
...Show More Authors

Mixed ligand complexes of bivalent metal ions, viz ; M= Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition [M(Anth)2(TMP)] in 1:2:1 molar ratio, (where . AnthrH= Anthranilic acid (C7H7NO2) and Trimethoprime (TMP) = (C14H18N4O3) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity (Λm ),determination the percentage of the metal (M%) in the complexes by (AAS), FT-IR, magnetic susceptibility measurements [µeff (BM)] and electronic spectral data. The two ligands and their metal complexes have been screened for their bacterial activity against selected microbial strains (Gram +ve) & (Gram -ve).

Publication Date
Sun May 01 2011
Journal Name
Information Sciences
Design and implementation of a t-way test data generation strategy with automated execution tool support
...Show More Authors

View Publication
Scopus (68)
Crossref (52)
Scopus Clarivate Crossref