Preferred Language
Articles
/
4BaEvooBVTCNdQwCVKRl
Alpha clustering preformation probability in even-even and odd-A<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e3355" altimg="si39.svg"><mml:msup><mml:mrow /><mml:mrow><mml:mn>270</mml:mn><mml:mo>−</mml:mo><mml:mn>317</mml:mn></mml:mrow></mml:msup></mml:math>(116 and 117) using cluster formation model and the mass formulae : KTUY05 and WS4
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 27 2024
Journal Name
Malaysian Journal Of Mathematical Sciences
Dynamics of a Social Model for Marriage and Divorce Relationship with Fear Effect
...Show More Authors

The objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2011
Journal Name
Journal Of Planner And Development
Architectural void is a revolution in the formation of the facades of digital architecture
...Show More Authors

Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
International Journal Of Mechanical Engineering And Technology (ijmet)
Information model of plastic products formation process duration by injection molding method
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Assessing the Potentiality of Using CXCL9 as A Predictive Biomarker for Acute and Chronic Toxoplasmosis, and Study the Correlation Between CXCL9, Toxoplasmosis and Thyroid Disorder in These Cases
...Show More Authors

     Background:  Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on. Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex agglutination test was done, followed by detec

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Research Journal Of Pharmaceutical,biological And Chemical Sciense
correlation of serum tumor necrosis factor alpha and high sensitive c-reactive protein with clinical periodontal parameters in osteoarthritis patients
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FACIES ANALYSIS AND NEW DISCOVERY OF A MASTODONT FROM INJANA FORMATION (LATE MIOCENE) NEAR THARTHAR LAKE- MIDDLE OF IRAQ
...Show More Authors

    The study area comprises Injana Formation (Late Miocene), exposed on the hills nearby of Tharthar Lake and about 120 km north of Baghdad city. This study depends on sedimentologic and facies analysis to recognize paleoenvironment and recognize the kinds of vertebrate bone fossils during Late Miocene. Sedimentologic and facies analysis showed many sedimentary facies: facies (Se) of scoured erosional surface, facies of (Sp) cross- bedded sandstones, facies (Fs) of fine sandstone facies, facies of (Fc) claystone, and facies of (C) calcareous clay. Facies analysis referred to the sub environments which are: point bar, over bank and floodplain in addition to fining upward cycles of deposition, which refers to meandering flu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Some Probability Characteristics Functions of the Solution of Stochastic Fredholm Integral Equation Contains a Known Sine Wave Function
...Show More Authors

Abstract:In this paper, some probability characteristics functions (moments, variances,convariance, and spectral density functions) are found depending upon the smallestvariance of the solution of some stochastic Fredholm integral equation contains as aknown function, the sine wave function

View Publication Preview PDF
Crossref