Preferred Language
Articles
/
4BaEvooBVTCNdQwCVKRl
Alpha clustering preformation probability in even-even and odd-A<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e3355" altimg="si39.svg"><mml:msup><mml:mrow /><mml:mrow><mml:mn>270</mml:mn><mml:mo>−</mml:mo><mml:mn>317</mml:mn></mml:mrow></mml:msup></mml:math>(116 and 117) using cluster formation model and the mass formulae : KTUY05 and WS4
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Aug 01 2019
Journal Name
Transylvanian Review
POSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL
...Show More Authors

POSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL

Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Interdisciplinary Mathematics
The dynamics of Coronavirus pandemic disease model in the existence of a curfew strategy
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Linguistic Analysis of Deduction in The Holy Qur’an: Surat Ghafir as a Model
...Show More Authors

This paper aims at discovering the real implication of deduction in the Arabic culture
with concentration on its applications in Arabic grammar, logic, and fundamentals of Islamic
legislations. Some light has been shed on deduction in the Arabic culture but most of recent
works did not analyze deduction according to the pragmatic analysis. This paper will answer
the following questions:
 to what extent deduction in Arabic grammar could comprehend with deduction l logic and
fundamentals of thinking in Islamic thought?
 how can we find the deduction thinking in the Qur’anic surah if Ghafir?
 Can we find parts of deduction in the surah?
The methodology in this paper is descriptive analytical. This metho

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Biodegradation of Diesel Contaminated Soil Using Single Bacterial Strains and a Mixed Bacterial Consortium
...Show More Authors

This study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel  88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Evaluation of radioactivity of cereals and legumes using a nuclear impact detector CN-85
...Show More Authors

The research aims to evaluate the radioactivity in elected samples of cereals and legume which are wide human consumption in Iraq using Nuclear Track Detectors (NTDs) model CN-85.
The samples were prepared scientifically according to references in this field. After 150 days of exposure, the detector were collected and chemically treated according to scientific sources (etching chemical), nuclear effects have been calculated using the optical microscope.
Radon (222Rn) concentration and uranium (238U) were calculated in unit Bq/m3 and (ppm), the results indicate that the highest concentration of radon and uranium was in yellow corn where the concentration of radon was 137.17×102 Bq/m3 and uranium concentration 2.63 (ppm). The lowest

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Engineering
A Comparison Study of Brine Desalination using Direct Contact and Air Gap Membrane Distillation
...Show More Authors

Membrane distillation (MD) is a hopeful desalination technique for brine (salty) water. In this research, Direct Contact Membrane Distillation (DCMD) and  Air Gap Membrane Distillation (AGMD) will be used. The sample used is from Shat Al –Arab water (TDS=2430 mg/l). A polyvinylidene fluoride (PVDF) flat sheet membrane was used as a flat sheet form with a plate and frame cell. Several parameters were studied, such as; operation time, feed temperature, permeate temperature, feed flow rate. The results showed that with time, the flux decreases because of the accumulated fouling and scaling on the membrane surface. Feed temperature and feed flow rate had a positive effect on the permeate flux, while permeate temperatu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref