Preferred Language
Articles
/
jpd-199
The Weighted Index Number Method
...Show More Authors

The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Determination of some characteristics of comet’s gases by photometry method for comet Hyakutake
...Show More Authors

The present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Effect of NPK fertilizer and root fertilizers Inicium on some physiological characters of Lycopersicon esculentum and its effect on mitotic division index of seedling radical apex
...Show More Authors

The experiment was carried out to study the effect of NPK and Inicium using two concentration for each of them 1 and 2 gm/L for NPK and 5 and 10 ml/L for Inicium on some physiological characters of Lycopersicon esculentum and mitotic division index of seedling radical apex. The results showed that all the characters increased plant height, stem diameter, leaves number, length of leaf, lobs number in one leaf, length of root and root diameter. The data showed that the percentage of cell division, mitotic division and Telophase stage increased in seedling radical apex comparison with control plants.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Physics
Effect of pH on the Structural and Optical Properties of Cadmium oxide Thin Films Prepared Using the Successive Ionic Layer Adsorption and Reaction (SILAR) Method
...Show More Authors

Cadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values ​​(7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Level of professional pressures during the use of e-learning teaching method among teachers of the Faculties of Physical Education and Sports Sciences in Baghdad
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 05 2004
Journal Name
Journal Of Physical Education
The evaluate of usage educational method for jump shooting and it effect on speed strength in basketball for specialized students in College Sport of Dayla University
...Show More Authors

The research aim to the usage educational method for jump shooting and it effect on speed strength in basketball for the specialist students in College Sport of Dayla University, which used the following statistic treatment (The T.test for compatible specimens), so after statistic treatment which appears theres a tow moral differences in speed strength and jump shooting tests results to (legs & arms) for the before and after tests, and after that the conclusions we positive and the second the special drills effect immaterial speed strength to legs and arms, so the tow researches recommended to looking after the best for educational methods that used in our sport colleges in Iraq.

Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis and Structural Determination of 6-O-prop-2-ynyl-1,2:3,4-di-O-Isopropylidene-α-D-Galactose
...Show More Authors

In this work, an important sugar alkynyl ether has been synthesized in two subsequent steps starting from commercially available D-galactose (3). This kind of compounds is highly significant in the synthesis of biologically active molecules such as 1,2,3-triazole and isoxazoles. In the first step, galactose (3) was reacted with acetone in the presence of anhydrous copper (II) sulfate to produce 1,2:3,4-di-O-isopropylidene-α-D-galactose (4) in good yield. The latter was reacted with excess of 3-bromoprop-1-yne in DMF in the presence of NaOH pellets to afford the target molecule 5 in a very good yield. The temperature of this step is crucial in determining the reaction yi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref