Preferred Language
Articles
/
7he4ZZIBVTCNdQwCZK5X
Assessing similarity matching for possible integration of feature classifications of geospatial data from official and informal sources
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 09 2023
Journal Name
College Of Islamic Sciences
The door of speaking souls From the book explaining the features of the origins of religion For Sheikh Abdul Rahman bin Abdullah Al-Khonji study and investigation
...Show More Authors

Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the st

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 17 2022
Journal Name
Al–bahith Al–a'alami
Lawyers’ Use of the Website of the Supreme Judicial Council and the Gratifications Obtained from It Drawn Research Submitted for the Study of the Higher Professional Diploma
...Show More Authors

The field study of this paper focused on the motives for lawyers to use the website
of the Supreme Judicial Council, and the gratifications achieved as a result of its use.
This study sought to achieve a number of goals, including:
1. Monitoring the patterns of lawyers’ use of the website of the Supreme Judicial Council.
2. Determining the forms that lawyers use to interact on the website of the Supreme
Judicial Council.
This study is a descriptive in kind as the researcher relied on the ‘survey method’ in
its study of the external audience (lawyers) using the questionnaire and scale toolThe questionnaire was distributed among a deliberately chosen sample, consisting of
(160) lawyers who used the website of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Optimization of Fenton process for removal of chemical oxygen demand (COD) from hospital wastewater using response surface methodology (RSM)
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
A study of adsorption isotherms for the removal of herbicide Atlantis WG from aqueous solutions by using Bentonite clay
...Show More Authors

The subject of this research involves studying adsorption to removal herbicide Atlantis WG from aqueous solutions by bentonite clay. The equilibrium concentration have been determined spectra photometry by using UV-Vis spectrophotometer. The experimental equilibrium sorption data were analyzed by two widely, Langmuir and Freundlish isotherm models. The Langmuir model gave a better fit than Freundlich model The adsorption amount of (Atlantis WG) increased when the temperature and pH decreased. The thermodynamic parameters like ?G, ?H, and ?S have been calculated from the effect of temperature on adsorption process, is exothermic. The kinetic of adsorption process was studied depending on Lagergren ,Morris ? Weber and Rauschenberg equati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conf. Proc.
Preparation of nanostructured MnO2/carbon fiber composite electrode for removal of Cu2+ ions from aqueous solution by electrosorption process
...Show More Authors

The nanostructured Manganese dioxide/Carbon fiber (CF) composite electrode was prepared galvanostatically using a facile method of anodic electrodeposition by varying the reaction time and MnSO4 concentration of the electrochemical solution. The effects of these parameters on the structures and properties of the prepared electrode were evaluated. For determining the crystal characteristics, morphologies, and topographies of the deposited MnO2 films onto the surfaces of carbon fibers, the X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), and atomic force microscopy (AFM) techniques were used, respectively. It found that the carbon fibers were coated with γ-MnO2 with a density that increased with increasing the de

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 29 2015
Journal Name
Separation Science And Technology
An acidic injection well technique for enhancement of the removal of copper from contaminated soil by electrokinetic remediation process
...Show More Authors

Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Aug 27 2024
Journal Name
Tem Journal
Preparing the Electrical Signal Data of the Heart by Performing Segmentation Based on the Neural Network U-Net
...Show More Authors

Research on the automated extraction of essential data from an electrocardiography (ECG) recording has been a significant topic for a long time. The main focus of digital processing processes is to measure fiducial points that determine the beginning and end of the P, QRS, and T waves based on their waveform properties. The presence of unavoidable noise during ECG data collection and inherent physiological differences among individuals make it challenging to accurately identify these reference points, resulting in suboptimal performance. This is done through several primary stages that rely on the idea of preliminary processing of the ECG electrical signal through a set of steps (preparing raw data and converting them into files tha

... Show More
View Publication
Scopus Clarivate Crossref