Preferred Language
Articles
/
EBczEZIBVTCNdQwC2p7B
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

Scopus
View Publication
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ANTIBACTERIAL ACTIVITY OF NATURAL (DATES AND APPLE CIDER) VINEGARS AGAINST FOODBORNE BACTERIAL PATHOGENS: ANTIBACTERIAL ACTIVITY OF NATURAL (DATES AND APPLE CIDER) VINEGARS AGAINST FOODBORNE BACTERIAL PATHOGENS
...Show More Authors

Local food samples investigated for the presence of pathogenic bacteria. Hash meat sample was used to isolate Escherichia coli and chicken meat (poultry) was used to isolate Salmonella typhi. Biochemical tests and API20E system used in order to identify these isolates. Two natural vinegar samples (dates & apple cider) were used in order to study its antibacterial activity against the two tested bacteria. Disc diffusion method was used, the results showed that two vinegar samples have antibacterial activity against the two tested bacteria. Date vinegar showed inhibition zone 19mm against E. coli & 9mm against S. typhi, while Apple cider vinegar showed diameter of inhibi

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION: PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION
...Show More Authors

Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
EL ANÁLISIS DE ERRORES DEL LEÍSMO Y LAÍSMO EN EL PAPEL DIDÁCTICO PARA LOS ALUMNOS DEL DEPARTAMENTO ESPAÑOLEN LA FACULTAD DE LENGUAS EN IRAK Search Summary: The analysis of the mistakes of the personal pronouns in effect replaces him in the
...Show More Authors

During the educational practices in the Spanish department at the Faculty of Languages ​​, University of Baghdad , we noticed that the personal pronouns in effect replaced by the direct and indirect characterized hardly be expressed , and the difficulty of her education.

Rationale: I chose this topic because the personal pronouns differ between the Spanish language and the Arabic language. We believe that this study may be useful not only for language teachers, but also for students, because it can contribute to a greater awareness of and correct weaknesses.

Objectives: To apply the model from which to address the problems in the use of personal pronouns Spanish , and the difference between effect of direct and indire

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Advanced Powder Technology
Modification of FAU zeolite as an active heterogeneous catalyst for biodiesel production and theoretical considerations for kinetic modeling
...Show More Authors

View Publication
Scopus (25)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Journal Of Control, Automation And Electrical Systems
Design of an Adaptive Linear Quadratic Regulator for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Strongly Convergence of Two Iterations For a Common Fixed Point with an Application
...Show More Authors

     In this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.

 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Dynamics and an Optimal Policy for A Discrete Time System with Ricker Growth
...Show More Authors

The goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Developing an Automated Vision System for Maintaing Social Distancing to Cure the Pandemic
...Show More Authors

The world is currently facing a medical crisis. The epidemic has affected millions of people around the world since its appearance. This situation needs an urgent solution. Most countries have used different solutions to stop the spread of the epidemic. The World Health Organization has imposed some rules that people should adhere. The rules are such, wearing masks, quarantining infected people and social distancing. Social distancing is one of the most important solutions that have given good results to confront the emerging virus. Several systems have been developed that use artificial intelligence and deep learning to track social distancing. In this study, a system based on deep learning has been proposed. The system includes monitor

... Show More
View Publication Preview PDF
Crossref (2)
Crossref