Preferred Language
Articles
/
Chf6upIBVTCNdQwCW78W
Reducing the negative effects of non-compliance and unethical behaviour by adopting the risk approach to human resources management
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Basic Education
Histological Changes in the Lung Tissues of male albino mice Exposed to Mospilan 20SG insecticide
...Show More Authors

View Publication
Publication Date
Fri Jun 07 2024
Journal Name
Asian Pacific Journal Of Cancer Prevention
The Effect of NF-κB Deactivation on Cancer Cell Response to ALA Mediated Photodynamic Therapy
...Show More Authors

due to the presence of chemoresistance and the risk of tumor recurrence and metastasis. There is a pressing necessity to develop efficient treatments to improve response for treatment and increase prolong survival of breast cancer patients. Photodynamic therapy (PDT) has attracted interest for its features as a noninvasive and relatively selective cancer treatment. This method relies on light-activated photosensitizers that, upon absorbing light, generate reactive oxygen species (ROS) with powerful cell-killing outcomes. Nuclear factor kappa B (NF-κB), a transcription factor, plays a key role in cancer development by regulating cell proliferation, differentiation, and survival. Inhibiting NF-κB can sensitize tumor cells to chemotherapeuti

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Wastewater Bio-solids Management for Fertilizer Quality Using Co- composting Process
...Show More Authors

Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a

... Show More
View Publication
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Information Systems And Change Management
Designing a knowledge management measurement for educational institutions: a qualitative research
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The world'srefugeesbetween the aggravation of the situation and the endeavors of international organizations
...Show More Authors

Human witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 04 2023
Journal Name
Journal Of Al-qadisiya In Arts And Educational Sciences
The use of the digital book and the future of the paper book
...Show More Authors

The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2019
Journal Name
Asa-cssa-sssa International Annual Meeting
Cover Crop Effects on Soil Health in Organic High Tunnels (2019).
...Show More Authors

High tunnels, or unheated plastic greenhouses, are becoming increasingly popular among organic vegetable growers across the United States. However, the intensive production typical of these systems presents soil health challenges, including salinization due to high fertilizer or compost inputs coupled with lack of rainfall to leach salts. Legume cover crops may improve soil health in high tunnels by reducing the need for external inputs, while adding organic matter. We tested the soil health effects of a winter hairy vetch (Vicia villosa Roth) cover crop used to replace fertilizer N in an organic tomato cropping system in high tunnels. Studies were replicated across three sites differing in climate and soil type (Kansas, Kentucky, and Minne

... Show More