Preferred Language
Articles
/
6BeHbI4BVTCNdQwCiEd5
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Chaotic behaviour of the Rossler model and its analysis by using bifurcations of limit cycles and chaotic attractors
...Show More Authors

The behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.

View Publication
Scopus (42)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Building a strategic perspective on the system of governance and measuring the level of its performance Survey study at the University of Basra
...Show More Authors

The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself.  From the main conclusions:-It is possible to building a strategic perspective

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of waste sorting and recycling laboratory in Mahmudiya (case study)
...Show More Authors

The daily practices of humans produce various types of waste, which are a threat to the health and environment surrounding it, especially after the increase in quantities as a result of population growth and technological development, and here came the need for recycling solid waste as one of the modern concepts that achieve environmental benefits, The aim of the research is to evaluate the project of sorting and recycling of solid waste in the district of Mahmoudiya and whether its work is sustainable ,Conforming to modern standards, using standard checklists to determine the gap between the current laboratory reality and the requirements of those standards , Using the case study methodology as the most appropriate approach

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 09 2026
Journal Name
International Journal Of Veterinary Sciences And Animal Husbandry
Review of multidrug sensitivity and resistance in enterococcus
...Show More Authors

Review of multidrug sensitivity and resistance in enterococcus

View Publication Preview PDF
Publication Date
Mon Sep 04 2017
Journal Name
Journal Of College Of Education For Women
Tagmemic Analysis of English and Arabic Praise Poetry: A Contrastive Study
...Show More Authors

This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions: Is it possible to examine praise poetry as a tagmeme? Is this analysis of great help in teaching English and Arabic to students in the College of Education? The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9. Each line in both English and Arabic data is numbered by the researcher herself. Then, those lines are grouped into sentences to facilitat

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Tagmemic Analysis of English and Arabic Praise Poetry: A Contrastive Study
...Show More Authors

 This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:

  1. Is it possible to examine praise poetry as a tagmeme?
  2. Is this analysis of great help in teaching English and Arabic to students in the College of Education?

           The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.

   &nbs

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 07 2021
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of knowledge Management Processes in the Tax Performance: AnApplied Research in the General Tax Authority
...Show More Authors

The research aims to measure the relationship and impact of the operations of the knowledge of management of the six dimensions (diagnosis knowledge, define knowledge objectives, knowledge generation, knowledge storage, distribution of knowledge, application of knowledge) in the fiscal performance of the General Authority for taxes of the four dimensions (financial, customers (taxpayers), Operations Interior, learn and grow), the research aims also to the use of computerized programs for training and career development of the Authority that helps to add knowledge workers in the Authority, and to reach an appropriate arrangement for knowledge management processes in the Authority, as well as analysis of the reality of the Authority to get

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More