Preferred Language
Articles
/
A4aOT4YBIXToZYALMIK7
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Proximal schemes by family of szl –widering mappings
...Show More Authors
Abstract<p>in this paper, we give a concept of <italic>szl</italic> –widering mapping which is independent of nonspreading mappings, <italic>k</italic> – strictly pseudo nonspring mappings and nonexpansive mappings. Also we introduce a new proximal point schemes of resolvent and <italic>szl</italic> –widering mappings. On the other hand, we discuss that the weak and strong convergence for these proximal point schemes in real Hilbert space under different conditions to asymptotic common fixed point of <italic>szl</italic> –widering mappings.</p>
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic of Disinfection reaction by Sodium Hypochlorite Solution
...Show More Authors

The present studier aims to study the kinetic of reaction at different experimental conditions depending on coliform bacteria concentration and hypochlorite ion. The effects that had been investigated were different of sodium hypochlorite doses, contact time, pH and temperature (20, 29, 37) o C. The water samples were taken from Al-Wathba water treatment plant in Risafa side of Tigris River in Baghdad. The biological tests included the most probable number (M.P.N) for indicating the concentration of coliform bacteria with different contact times and the total plate count (T.P.C) for indicating the amount of colonies for general bacteria. The iodimetry method (chemical test) was used for indicating the concentration of hypochlo

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 04 2019
Journal Name
Drinking Water Engineering And Science Discussions
Bio-purification of drinking water by froth flotation
...Show More Authors

Abstract. The main technique for removing bacteria from water for various applications is chemical disinfection. However, this method has many disadvantages such as producing disinfectant by-products (DBPs), biofilm formation and either rendering the water unpotable (at high residual disinfection) or leaving a potential for lethal diseases such as Cholera (if the residual disinfection is too low). Recently, a process was developed for continuous removal of bacteria from water using the principle of froth flotation through compressed air only without any chemicals (Hassan, 2015). This work examines the extent to which chemical free froth flotation can purify drinking water. The experiments were carried out using two flotation columns

... Show More
View Publication
Crossref
Publication Date
Mon Mar 06 2023
Journal Name
Biofactors
Mechanisms of cancer cell death induction by triptolide
...Show More Authors
Abstract<p>Drug resistance is a hot topic issue in cancer research and therapy. Although cancer therapy including radiotherapy and anti‐cancer drugs can kill malignant cells within the tumor, cancer cells can develop a wide range of mechanisms to resist the toxic effects of anti‐cancer agents. Cancer cells may provide some mechanisms to resist oxidative stress and escape from apoptosis and attack by the immune system. Furthermore, cancer cells may resist senescence, pyroptosis, ferroptosis, necroptosis, and autophagic cell death by modulating several critical genes. The development of these mechanisms leads to resistance to anti‐cancer drugs and also radiotherapy. Resistance to therapy can increase mortal</p> ... Show More
View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Treatment of Used lubricant Oil by Solvent Extraction
...Show More Authors

This study investigates the treatment of used lubricating oils from AL-Mussaib Gas Power Station Company-Iraq, which was treated with different extractive solvents (heptane and 2-propanol). The performance activity of these solvents in the extraction process was examined and evaluated experimentally. Operating parameters were solvent to oil ratios of (1:2, 1:4, 1:6, and 1:8), mixing time (20, 35, 50, and 65 min), temperatures (30, 40, 50, and 60 ºC), and mixing speed (500 rpm). These parameters were studied and analyzed. The quality is determined by the measuring and assessment of important characteristics specially viscosity, viscosity index, specific gravity, pour point, flash point, and ash content. The results confirm that the solve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Journal Of Optics
Novel characteristics of CQDs synthesized by electrochemical method
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref