Preferred Language
Articles
/
EBdYu5IBVTCNdQwCab-8
The efficiency of cluster analysis to analyzing medical image of Covid-19 patient by using K-means algorithm
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Evaluation the efficiency of Trichomonas vaginalis depending on clinical sings , direct examination ,culturing and serological test
...Show More Authors

The adequacy of diagnostic tests, together with trichomoniasis associated clinical symptoms, were investigated in females suffering vaginitis, and they were referred to the Gynecology Department, Al-Yarmouk Teaching Hospital during the period December 2004 – June 2005. The total number of patients was 250 cases (age range: 18 - 52 years), and each patient was examined using a sterile speculum to obtain vaginal swabs for examination. The diagnosis with T. vaginalis was done in many methods. The direct methods included wet and stained (Leishman's stain) examinations and cultivation in different culture media (Kupferberg Trichomonas Broth Base;, Trichomonas Agar Base; TAB and Trichomonas Modified CPLM), while the indirect methods were serol

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Charge Stratification and Fuel/Air Ratio Effect on the Efficiency of (ICADE) I. C. Engine Cycle
...Show More Authors

The Isolated Combustion and Diluted Expansion (ICADE) internal combustion engine cycle combines the advantages of constant volume combustion of the Otto cycle with the high compression ratio of the Diesel cycle.   This work studies the effect of isolated air mass (charge stratification) on the efficiency of the cycle; the analysis shows that the decrease of isolated air mass will increase the efficiency of the cycle and the large dilution air mass will quench all NOx forming reactions and reduce unburned hydrocarbons. Furthermore, the effect of Fuel / Air ratio on the efficiency shows that the increase of Fuel / Air ratio will increase efficiency of the cycle.

View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-adab Journal
A Socio-Pragmatic Analysis of Responses to Impoliteness in some Selected English and Arabic Literary Texts
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal
Semantic Analysis of Proverbs: A Conversation Analysis
...Show More Authors

Proverbs are considered as a major source of ancient events and happenings. Similar to other past events related to life, proverbs have many important and famous values in people's life. This study will shed lights on the use of proverbs as short sentences based on long experiences. The aim of the study is to explicate the roles, and the importance of proverbs in our life and how they are used to convey thoughts to people throughout simple words with denotation. Thus, proverbs explicate the truth and experience of our grandfathers when directed for criticism. Few proverbs were used by writers to criticize, mimic and reprint their personalities. Hence, proverbs will achieve portions of the unique roles of understanding. The model to

... Show More
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Using Online Platforms to Improve Writing
...Show More Authors

Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref