Preferred Language
Articles
/
jeasiq-1131
Notes on estimation of ARMA model (1.1) And ARMA (0,1)
...Show More Authors

By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign   and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root      gives invertible model and when the sign is negative means the root      gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Violence and Islam
...Show More Authors

Most of the texts of Islamic law provide for the payment of damage and the denial of the human ... Damage of all kinds of material and moral, which is in the harm that affects the human being in himself or his offer or money or other affairs respected by Sharia. A person can defend himself, his mind, his religion, his offer and his money (the five imperatives) as much as he can. Islam rejects violence directed without a legitimate right and does not endorse aggression against others. Violence has been defined in language as a lack of compassion or against it or is a reprimand, bashing, and the blame ... It is in psychology: human behavior tainted by cruelty, oppression, and aggression, and is defined politically: it is deliberate civil d

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Systematic Reviews In Pharmacy
Estimation of activity and toxicity of silver nanoparticles loaded metronidazole against Giardia lamblia
...Show More Authors

Giardia lamblia is one of most common protozoan cause diarrheas, and the most health problem in development countries worldwide. Our work aimed to assess activity and toxicity of metronidazole loaded silver nanoparticles in treatment of acute giardiasis in mice. After inoculated mice with Giardia cysts in a dose of 105 cyst for acute infection, treatments were given for eight days. Number Giardia cysts in stool were discovered. Toxicity nanoparticles was estimated by Measurement oxidative stress markers (GSH) and (MDA) in liver, kidney tissue homogenate. The results showed single therapy was better effect by silver nanoparticles, highest percentages of reduction in number of cysts Giardia lamblia of infected mice treated with silver nanopar

... Show More
Scopus
Publication Date
Wed Nov 24 2021
Journal Name
International Journal Of Differential Equations
The Impact of Media Coverage and Curfew on the Outbreak of Coronavirus Disease 2019 Model: Stability and Bifurcation
...Show More Authors

In this study, the spreading of the pandemic coronavirus disease (COVID-19) is formulated mathematically. The objective of this study is to stop or slow the spread of COVID-19. In fact, to stop the spread of COVID-19, the vaccine of the disease is needed. However, in the absence of the vaccine, people must have to obey curfew and social distancing and follow the media alert coverage rule. In order to maintain these alternative factors, we must obey the modeling rule. Therefore, the impact of curfew, media alert coverage, and social distance between the individuals on the outbreak of disease is considered. Five ordinary differential equations of the first-order are used to represent the model. The solution properties of the system ar

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Int. J. Adv. Appl. Math. Andmech.
The effect of external source of disease on the epidemic model
...Show More Authors

Publication Date
Sat Dec 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Welding of Low Alloy Steel DIN 15Mo3 by MIG/MAG Spot
...Show More Authors

This research deals with the effects of welding variables using MIG/MAG spot by using Argon (Ar) gas and CO2 to show their effect on the mechanical characteristics and microstructure of low alloy steel type DIN15Mo3 and determine the optimum condition for the process of welding ; current & time. The results show the possibility of using CO2 and also Ar in low alloy steel welding with a little decrease in the shear force of not more than 13% for 4mm thickness and time 2sec. The shear force increased when using Ar instead of CO2 to be , The shear force reach 36KN when using Ar at 2mm thickness  time of 8 sec and current of 220 Amp. , when used CO2 instead of Ar d

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Intervention Program on Nurses' Practices concerning Diet Instructions for Orthopedic Patients treated by Internal Fixation Devices
...Show More Authors

Abstract

Objective(s): To determine the interventional program effectiveness on nurses' practices concerning diet instructions for orthopedic patients treated by internal fixation devices.

Methodology: A quantitative approach using prexperimental design is conducted to determine the effectiveness of an interventional program on nurses’ practices regarding orthopedic patients diet instruction and teaching after internal fixation implemented. The study has started from 1st of April 2022 and ended on 15th of December, 2022. The conduction of the study in Misan governorate  / Al-Zaharawy surgical hospital. A non-probability, purpo

... Show More
View Publication Preview PDF
Crossref