Preferred Language
Articles
/
0BZ0IocBVTCNdQwCsTnm
Effect of Adding Chopped Carbon Fiber (CCF) on the Improvement of Gypsum Plaster Characteristicssss
...Show More Authors
Abstract<p>The current work studies the effect of adding chopped carbon fiber (CCF) on gypsum plaster properties (precisely the compressive strength and the modulus of rupture). The research plan consists of using six mixes of gypsum plaster; these mixes are divided into two groups according to the (Water/Gypsum) ratios (0.5 & 0.6). Each group was divided into three subgroups according to CCF volume fraction (Vf): 0.0%, 0.2% and 0.4%. Three cubic (50×50×50) mm and three prismatic (40×40×160) mm samples were performed for each mix. It was found that, the addition of CCF to the gypsum plaster mixes increases both the compressive strength and the modulus of rupture for both (W/G) ratios, and the percentage of this increase is enlarged with increasing (W/G) ratio. On the other hand, when (W/G) ratio is enlarged, the compressive strength and the modulus of rupture is deteriorated for all (Vf) of CCF, and this percentage of deterioration is decreased in the presence of CCF.</p>
Scopus Crossref
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Orthogonal Derivations and Orthogonal Generalized Derivations on - Modules
...Show More Authors

Let M be ,-ring and X be ,M-module, Bresar and Vukman studied orthogonal
derivations on semiprime rings. Ashraf and Jamal defined the orthogonal derivations
on -rings M. This research defines and studies the concepts of orthogonal
derivation and orthogonal generalized derivations on ,M -Module X and introduces
the relation between the products of generalized derivations and orthogonality on
,M -module.

View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Considered Interest in Criminalizing Assault on Public Facilities
...Show More Authors

Public utilities are the most important institutions at the present time, because of their great importance in providing daily services to citizens to meet their needs, and thus help the state to develop and progress in various social, economic and even security fields, and they also have a major role in creating an environment filled with stability and good life.

Due to the great importance of public utilities, the hand of the legislator extended to protecting and regulating them in many legal texts, so he singled out many texts for them, whether in regulatory or even penal laws, and because penal texts are the most important legal texts because of their great role in protection, as well as their connection to the rights and fre

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Reducing water stress on apricot saplings cv. Zanjelly
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Injectivity and chain conditions on y-closed submodules
...Show More Authors

Let R be a commutative ring with identity and let M be a unital left Rmodule.
Goodearl introduced the following concept :A submodule A of an R –
module M is an y – closed submodule of M if is nonsingular.In this paper we
introduced an y – closed injective modules andchain condition on y – closed
submodules.

View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Network Authentication Protocol Based on Secure Biometric NIDN
...Show More Authors

In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control &amp; Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (8)
Crossref (4)
Scopus Crossref