Preferred Language
Articles
/
9xcDvY4BVTCNdQwCzFdh
THE EFFECT OF USING A DISABLING FORCE TRAINING TOOL ON WALKING PERFORMANCE: AN ANALYTICAL STUDY OF TIME AND STEP LENGTH IN THE 20 KM WALKING RACE EVENT FOR APPLICANTS
...Show More Authors

Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Analytical Approaches between New Media and Traditional Media
...Show More Authors

The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of common concepts in the field of communication and media. The researcher tries to find an analytical explanation of the relationship between technology by being an influential factor in building the information society, which is the basis of new media, and the technical output that influenced the forms of social relations and linguistic construction as a human communication tool. The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of comm

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
The Role of Water Absorption on Thermal Conductivity and Mechanical Properties for (Recycling HDPE-Coal Ash) Composite
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Murabaha for real estate and its reflection on the profitability of Al-Nahrain Islamic Bank: applied research
...Show More Authors

The Islamic Bank of Al-Nahrain offers a formula for financing the purchase of real estate through a deferred sale contract, through Murabaha to the order to buy, and the payment of the price is in the form of instalments that include (the purchase price of the profit and the mutual agreement on the real estate). This research aims to show the reflection of real estate murabaha on the bank's investments, by measuring the effect of real estate murabaha on the profits achieved by the Islamic Bank of Al-Nahrain Bank. The growth of 'real estate murabaha' realized from the 'amounts granted by Bank X, in addition to analyzing the financial ratios of profitability indicators, including (return on deposits Y2) and for the years (2016 - 20

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (23)
Crossref (10)
Scopus Crossref
Publication Date
Mon Aug 27 2018
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study on Doweled Expansion Joints on Behavior for Plain Concrete Pavement System
...Show More Authors

This paper deals with load-deflection behavior the jointed plain concrete pavement system using steel dowel bars as a mechanism to transmit load across the expansion joints. Experimentally, four models of the jointed plain concrete pavement system were made, each model consists of two slabs of plain concrete that connected together across expansion by two dowel bars and the concrete slab were supported by the subgrade soil. Two variables were dealt with, the first is diameter of dowel bar (12, 16 and 20 mm) and the second is type of the subgrade soil, two types of soil were used which classified according to the (AASHTO): Type I (A-6) and type II (A-7-6). Experimental results showed that increasing dowel bar diameter from 12 mm to 20 mm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Combining Video Lectures and Kolb Experiential Learning on EFL Student-Teachers’ Ability to Teach Communicative Coursebook and their Teaching Competencies
...Show More Authors

Communicative-based textbooks are developed and disseminated throughout the country.
However, it is difficult for teachers who themselves have learnt English through the traditional
approaches to suddenly be familiar with CLT (Communicative Language Teaching) principles
and teach communicatively. Therefore, many teachers remain somewhat confused about what
exactly CLT is and others familiar with CLT but unable to achieve communicative classroom
teaching. Consequently, those teachers need to be introduced to the CLT principles and they need
training in how to put CLT principles into practice. Accordingly, this study aims to find out the
effect of combining video lectures and Kolb experiential learning on EFL student-t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
The influence of He-Ne Laser (632.8 nm) on Candida albicans isolated from complete upper dentures: In vitro study
...Show More Authors

The main objective of this study is to determine whether the use of He-Ne Laser (632.8 nm wavelength and power 0.5 mW) is an eligible and effective tool to kill or reduce the cell viability of Candida albicans isolated from complete upper dentures. Twenty one swabs were taken from the complete upper dentures. Only six swabs showed positive cultures for C. albicans. The isolate was divided into two groups, group I was not irradiated (control), and group II was irradiated by He-Ne Laser for different periods (10, 15, 20, and 30) min. After irradiation, the results showed a significant reduction in the viable cell count and colonies diameters especially at exposure periods 10 and 15 min. Although the low power He-Ne Laser was not eradicating t

... Show More
View Publication Preview PDF
Crossref