Preferred Language
Articles
/
9BeJbI4BVTCNdQwC9EcT
The use of Artificial Neural Network (ANN) for modeling of Cu (II) ion removal from aqueous solution by flotation and sorptive flotation process
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use of the costs of environmental quality and its impact on income
...Show More Authors

        Accompanied Activity Economic Unity some negative effects in the environment of air, water and soil pollution of difficult to measure each other for being the external costs and to be avoided such expenditures should be measured or estimated value to be disclosed environmental costs at the heart of the financial statements of economic unity to inform managers and users of the financial statements on the implications costs environmental .and impact in reducing environmental costs and increase future income and economic unit, was based on research into the inductive approach through books, letters, journals and the internet to cover the theoretical framework of the research. And to the analyt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Analysis of curved optical absolute visual fates of super colony of Type II (SN II)
...Show More Authors

Were analyzed curved optical fates Almarchih absolute colony of the binary type, the Great Palmstqrh using mathematical relationships derived for that and that gave us the results closer to the results of the observed spectral Great Colonial

View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use the le'vy Model on stock returns for some Iraqi banks estimate
...Show More Authors

 

In this article we  study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those  estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.

which showed the results to a preference MLE on MME based on the standard of comparison the average square e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
The influence of CdCl2 layer and annealing process on the structural and electrical properties of CdTe films
...Show More Authors

A polycrystalline CdTefilms have been prepared by thermal evaporation technique on glass substrate at room temperature. The films thickness was about700±50 nm. Some of these films were annealed at 573 K for different duration times (60, 120 and 180 minutes), and other CdTe films followed by a layer of CdCl2 which has been deposited on them, and then the prepared CdTe films with CdCl2 layer have been annealed for the same conditions. The structures of CdTe films without and with CdCl2 layer have been investigated by X-ray diffraction. The as prepared and annealed films without and with CdCl2 layer were polycrystalline structure with preferred orientation at (111) plane. The better structural pr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Role of Egyptian Workers in World War II
...Show More Authors

The Egyptian labor movement is the oldest trade union movement in the Arab region. Beside, the labor movement in any society is, in fact, only a reflection of the extent of awareness of that class in that society. Such a comparison is based on the degree of social growth the working class has reached. Moreover, the Egyptian working class was characterized by modernity in its inception compared to other social forces and classes. In addition, its development is linked to the level of industrial development of the country. The peasants and craftsmen were the mainstay of production in the Egyptian society over several centuries. The labor union movement also represents the human aspect of the labor force when it encounters and interacts wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
theoretical study to calculate some parameters of ion optical system
...Show More Authors

Preview PDF