Preferred Language
Articles
/
rRbGWIsBVTCNdQwCTMm4
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The effect of the marketing channel of the service on marine insurance losses: a case study in the Iraqi insurance company
...Show More Authors

All businesses seek to improve their levels of profits through various means, most notably their marketing channels, which ensure the delivery of their products to their customers in a safe manner in a timely manner. It considers losses to a minimum and that insurance companies place great interest in marine insurance losses because they often constitute huge amounts compared to other losses, hence the problem of research, which is centred on the type and size of the impact owned by the channel The Iraqi insurance company was chosen to be applied according to the intentional sample method because this company is closely related to the subject matter. The research has reached a set of conclusions, most notably that the choice of i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring the actual implementation of e-wallet application in Malaysia
...Show More Authors

E-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Apr 02 2022
Journal Name
The International Conference On Science In Engineering And Technology (icosiet) 2020 (virtually)
The Possible Application of Intelligent Systems in Traditional Courtyard House.
...Show More Authors

View Publication
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Hydrogen Energy
Exploring the application of AlN graphyne in calcium ion batteries
...Show More Authors

Destiny functional theory (DFT) calculations are undertaken in order to scrutinize the electrochemical and calcium (Ca) storage characteristics of a graphyne-like aluminum nitride monolayer (G-AlNyen) as an electrode material for Ca-ion batteries (CIBs). The results show that the change in internal energy as well as the cell voltage values for the CIB with the G-AlNyen anode are comparable to others with two-dimensional 2D nano-materials. It is shown that Ca is adsorbed primarily onto the center of a hexagonal and triangular ring of G-AlNyen with absorption energies of −2.06 and −0.42 eV. After increasing the concentration of Ca atoms on G-AlNyen, the adsorption energy as well as the cell voltage decreases. Lower values of 0.15–0.32 e

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Physics
Electro spinning of Polycaprolactone / Hydroxyapatite Composites in Wound Dressing Application
...Show More Authors

Polycaprolactone polymer is widely used in medical applications due to its biocompatibility. Electro spinning was used to create poly (ε- caprolactone) (PCL) nanocomposite fiber mats containing hydroxyapatite (HA) at concentrations ranging from 0.05 to 0.4% wt. The chemical properties of the fabricated bio composite fibers were evaluated using FTIR and morphologically using field-emission scanning-electron microscopy (FESEM), Porosity, contact angle, as well as mechanical testing(Young Modulus and Tensile strength) of the nanofibers were also studied. The FTIR results showed that all the bonds appeared for the pure PCL fiber and the PCL/HA nano fibers. The FESEM nano fiber showed that the fiber diameter increased from 54.13 to 155.79 (n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prepared 13X Zeolite as a Promising Adsorbent for the Removal of Brilliant Blue Dye from Wastewater
...Show More Authors

The research discussed the possibility of adsorption of Brilliant Blue Dye (BBD) from wastewater using 13X zeolite adsorbent, which is considered a byproduct of the production process of potassium carbonate from Iraqi potash raw materials. The 13X zeolite adsorbent was prepared and characterized by X-ray diffraction that showed a clear match with the standard 13X zeolite. The crystallinity rate was 82.15% and the crystal zeolite size was 5.29 nm. The surface area and pore volume of the obtained 13X zeolite were estimated. The prepared 13X zeolite showed the ability to remove BBD contaminant from wastewater at concentrations 5 to 50 ppm and the removal reached 96.60% at the lower pollutant concentration. Adsorption measurements versus tim

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Visual Language as a Reflection of Culture: Violence Against Women in Iraq
...Show More Authors

The present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado

... Show More
View Publication Preview PDF
Crossref