Preferred Language
Articles
/
9BYx8IoBVTCNdQwCg6iL
Assessing moment-based boundary conditions for the lattice Boltzmann equation: A study of dipole-wall collisions
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
Feminization and Masculinization of the Word Sun in the Holy Quran: A Semantic Study
...Show More Authors

It is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 05 2018
Journal Name
Acs Applied Nano Materials
Direct Formation of 2D-MnO<sub><i>x</i></sub> under Conditions of Water Oxidation Catalysis
...Show More Authors

We describe the synthesis and characterization of a novel 2D-MnOx material using a combination of HR-TEM, XAS, XRD, and reactivity measurements. The ease with which the 2D material can be made and the conditions under which it can be made implies that water oxidation catalysts previously described as “birnessite-like” (3D) may be better thought of as 2D materials with very limited layer stacking. The distinction between the materials as being “birnessite-like” and “2D” is important because it impacts on our understanding of the function of these materials in the environment and as catalysts. The 2D-MnOx material is noted to be a substantially stronger chemical oxidant than previously noted for other birnessite-like manganese oxi

... Show More
View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Effect of Different Conditions on Viability and Antagonistic Activity of Saccharomyces boulardii on Enteric Pathogenic Bacteria
...Show More Authors

In this part of programme , different bacterial isolates mainly Salmonella spp, Shigella spp and Escherichia coli were used for antagonism with Saccharomyces boulardii under different conditions . S.boulardii was grown under aerobic conditions and antagonized with young overnight nutrient broth cultures of test bacterial isolates and other kept in refrigerator for a week after full growth . Young cultures were more susceptible to antagonistic effect of yeast compared to old cultures and on isolates grown on solid medium for 24 hr. S.boulardii grown under aerobic and microaerobic conditions and antagonized with overnight broth cultures of test bacterial isolates , The results revealed that aerobic cultures of yeast had more inhibito

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A study of the Rate of Sedimentation of Magnesium Hydroxide Obtained from Bittern
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Applied Thermal Engineering
Consecutive charging and discharging of a PCM-based plate heat exchanger with zigzag configuration
...Show More Authors

View Publication
Scopus (67)
Crossref (60)
Scopus Clarivate Crossref
Publication Date
Wed May 31 2023
Journal Name
International Journal Of Sustainable Development And Planning
Prediction of Formal Transformations in City Structure (Kufa as a Model) Based on the Cellular Automation Model and Markov Chains
...Show More Authors

The research utilizes data produced by the Local Urban Management Directorate in Najaf and the imagery data from the Landsat 9 satellite, after being processed by the GIS tool. The research follows a descriptive and analytical approach; we integrated the Markov chain analysis and the cellular automation approach to predict transformations in city structure as a result of changes in land utilization. The research also aims to identify approaches to detect post-classification transformations in order to determine changes in land utilization. To predict the future land utilization in the city of Kufa, and to evaluate data accuracy, we used the Kappa Indicator to determine the potential applicability of the probability matrix that resulted from

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref