Preferred Language
Articles
/
jcois-526
Memorizer Keeper      And his method in his masterpiece      Supervision by the parties
...Show More Authors

What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 20 2016
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Development Accounting Rule disclosure by accounting policies in the light of Islamic and electronic banking Activities (Proposal pattern): Proposal pattern
...Show More Authors

the bank sect for any country  is very important  because  its represent a major  nerve   to feed a verity economic and finance activities .development any state measure by development  banking  sets and its represent  important  factor to investors attract . and because  important  of this subject ,teen accounting rule is a specialized for it .its related by  Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit  by auditing and accounting standard  consul in republic of Iraq.in date 10/28/1998.                      &

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 09 2018
Journal Name
World Rural Observations
Solid cartridges in Determination of Benzidines in River and Wastewater by HPLC
...Show More Authors

A solid Phase Extraction (SPE) cartridges followed by HPLC-UV method is described for the simultaneous quantitative determination of benzidine (BZ) and its substituted 3, 3’-dichlorobenzidine (DCB) and 3, 3’-Dimethylbenzidine (DMB). The Benzidines were separated by liquid chromatography using a C-18 column with UV detector at wave length of 280nm. The mode of Flow was isocratic. The mobile phase was consisted of 75:25 methanol: water, column temperature 50C°, and Flow Rate 1.8ml/min. Calibration curves were linear (R2 = 0.9979-0.9995). LOD (26.36-33.67) µg/L, LOQ (109.98-186.11) µg/L, the Robustness (2.99-4.35), Ruggedness (2.93-3.65).Conditions of extraction by (SPE) cartridges were optimized, the resin used is Octadecyl silica (ODS

... Show More
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Preparation of Media for Growth and Isolation of Lactic Acid Bacteria by Using the Starch-Industry by- Products
...Show More Authors

By- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Changes in the Growth and Yield of Broccoli Grown in the Alternative Solution ABEER, Affected by Gas Enrichment and Spraying with Organic Nutrients under the Hydroponic Cultivation System
...Show More Authors
Abstract<p>A Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study changes in the growth and yield of broccoli grown in the alternative solution ABEER, affected by gas enrichment and spraying with coconut water and moringa aqueous extract under the hydroponic cultivation system. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O<sub>2</sub> and O<sub>3</sub>), Then levels of second factor were randomly distributed within each replicate, which included spra</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Nature of Non-verbal Communication Skills Practiced by Educational Counselors in Individual Guidance
...Show More Authors

This research is an attempt to achieve the following objectives: 1. identifying the nature of the non-verbal communication skills practiced by educational counselors in individual guidance. 2. Identifying the significant differences between non-verbal communication skills exercised by educational counselors from their point of view in regard to their gender (male-female). The researcher used a questionnaire as a tool prepared based on exploratory questions of educational counselors and literature. It has consisted of (26) items over four domains applied to a sample of (50) educational counselors (male and female) who have been chosen randomly from schools located in Baghdad Education Directorate Rusafa / 2. It was treated statistically u

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution
...Show More Authors

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref