Preferred Language
Articles
/
jmracpc-52
DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS: DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS
...Show More Authors

The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Repetition in Criticism Experience in Andalus Poetry
...Show More Authors

Internal Music is considered as a basis to form music melody that sends rapture and
ecstasy within ones selves since it occurs directly on ears ( hearing) and since it tightens the
meaning to make it penetrating into Heart. It is rhythmic organization occurred inside the text
due to movements of internal sounds since rhythm heavily depends on language and
pronunciation. Repetition adds music melody to the poetic text since it increases music in
poetry. The sounds that reoccurred either be letters or words are no more than confirmation.
Thus , repetition is artistic phenomena most poets resorted to as to diverse his subjects and
metaphors he depicts in his poetry. The repetition has achieved artistic aesthetics , mean

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 ECONOMIC IMPORTANCE OF FOOD INDUSTRIES IN IRAQ (COMPARED TO INTERNATIONAL ECONOMIC INDICATORS).: ECONOMIC IMPORTANCE OF FOOD INDUSTRIES IN IRAQ (COMPARED TO INTERNATIONAL ECONOMIC INDICATORS).
...Show More Authors

In this paper, a comparison of production and domestic consumption of Iraq's food industries within economic environment of a sample of countries is presented. Tracked by a number of variables, To extrapolate the reality of this industry in terms of its importance to individual consumption and importance on national economy, then, to find size and type of obstacles facing the industry in Iraq. Relationship was measured through use of quantitative methods and digital data in the comparison process. Results showed that the large growth in the size of the population in Iraq is not the first multiplier in the high consumption of processed food, but the increase in the per-capita income. The treatment takes several aspects related to the gene

... Show More
View Publication Preview PDF
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
ENHANCEMENT OF THE SOCIAL DIMENSION IN THE SUSTAINABLE ENVIRONMENT STRATEGY IN IRAQ
...Show More Authors

Improving the environment is a mission that should be conducted by three associates; public authorities, environmentalists and the community. The ignorance of environmental education in Iraq has resulted to an almost environmentally illiterate community, demanding well planned programs to raise their environmental; awareness and education. On the other hand, the decision makers should be well informed about the citizens' environmental preferences to be able to set their priorities for the civil services. Merging the Iraqi citizens in listing their environmental priorities is one of many other approaches for "Environment Education" programs. Globally, such methods have proven to be effective and resulted to widespread understandin

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Some indicators of the economic productivity in the industrial sector in Iraq
...Show More Authors

Industry represents a cornerstone of the process of economic development and a measure of progress and contribute to increased prosperity and high standard of living.

The researcher analyzed the productivity indicators in industrial facilities large and small at several time periods ranging from 1970 to 2009, according to the economic situation that prevailed in each period.

    Different impact of periods under discussion, it made ​​Iraq the cash surpluses during the period 70-1980 then the effects of the war after 1980 and the economic blockade since 1990, and the subsequent events of the year

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Development and democracy in the Republic of Korea study in dialectic relationship
...Show More Authors

After its 35-year occupation of Japan and the US occupation, Korea has set its sights on a long-term goal of building its country and establishing its foundations, unobtrusive and unchecked by the problems and wars that have stood in the way of its goal, surpassing all odds and achieving the best results. The most powerful Asian and global economies, which gained the respect of the world and its appreciation of the experience has become referred to as boys

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref