Preferred Language
Articles
/
6BYdRokBVTCNdQwC54cG
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
The use of cold atmospheric plasma in pentostam enhancement as Leishmaniasis treatment in vitro
...Show More Authors

This study illustrates in vitro effect of cold atmospheric plasma (CAP) on the treatment of Leishmania. In addition, the study evaluated the effect of drug treatment (pentostam) and the combination treatment of pentostan and CAP at different doses and incubation time 24 h in order to assess the most effective treatment. The duration of the cold plasma doses was 1 min, 2 min and 3 min, while the pentostam doses were 2.5 µg/ml and 5 µg/ml. The combinations therapies included combining the three cold plasma doses with the pentostam doses to test 6 combinations of treated in vitro. The maximum growth inhibition was given by combination treated 46% and 44% for donovani and tropica leishamnia respectively; these results give an indi

... Show More
View Publication
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Correction of Spherical Aberration of an Immersion Lens Operating Under Space Charge Effect Described by a 2nd Order Equation
...Show More Authors

The present work represents a theoretical study for the correction of spherical aberration of an immersion lens of axial symmetry operating under the effect of space charge, represented by a second order function and preassigned magnification conditions in a focusing of high current ion beams. The space charge depends strongly on the value of the ionic beam current which is found to be very effective and represents an important factor effecting the value of spherical aberration .The distribution of the space charge was measured from knowing it's density .It is effect on the trajectory of the ion beam was studied. To obtain the trajectories of the charged particles which satisfy the preassined potential the axial electrostatic potential w

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of Auditors the Islamic Financial Engineering tool for Assessing Funding Risk Management in Islamic Banks: Applied research on a sample of Islamic banks
...Show More Authors

Experience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2017
Journal Name
Arabian Journal For Science And Engineering
A New Method to Tune a Fractional-Order PID Controller for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Jan 09 2012
Journal Name
Воронеж. гос. ун-т
STRUCTURAL-SEMANTIC FEATURES OF ONE-COMPONENT SENTENCES IN THE PLAYS OF A.N. OSTROVSKY
...Show More Authors

Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering
A Comprehensive Review for Integrating Petrophysical Properties, Rock Typing, and Geological Modeling for Enhanced Reservoir Characterization
...Show More Authors

Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and

... Show More
View Publication Preview PDF
Crossref