Preferred Language
Articles
/
GRZZgYcBVTCNdQwCHFQg
Reducing False Notification in Identifying Malicious Application Programming Interface (API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Wed Feb 23 2022
Journal Name
Iraqi Journal Of Agricultural Sciences
AN ECONOMIC ANALYSIS OF SOME FACTORS AFFECTING IN MARKETING EFFICIENCY OF DRY ONION CROP USING THE TOBIT REGRESSION MODEL
...Show More Authors

The study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Big data analysis by using one covariate at a time multiple testing (Ocmt) method: Early school dropout in iraq
...Show More Authors

Scopus (4)
Scopus
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of the Corona Pandemic (covid-19) on the Quality of the Auditor’s Reporting by Application to Iraqi Economic Units
...Show More Authors

Abstract:

     The research aims to shed light on the Corona pandemic and its repercussions on the global economy in general, and on the activities of Iraqi economic units in particular. It also aims to show the impact of the auditor’s reporting on the effects of the Corona pandemic on economic units and its reflection on the quality of his reporting. To achieve the objectives of the research, the researcher prepared a questionnaire according to the five-point Likert scale and took into account in its preparation compatibility with the characteristics of the study community, and that the target community for this questionnaire are the economic units listed in the Iraq Stock Exchange that have complet

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Degree of Application of Digital Leadership and its Relationship to the Development of Administrative Work at the University of Tabuk
...Show More Authors

This study aims to explore the relationship between the degree of application of digital leadership and the development of administrative work at the University of Tabuk. It further aims to examine the presence of statistically significant differences between the average responses of faculty members and employees at the University of Tabuk regarding the study axes that are attributed to the following variables: (scientific rank, gender, and job), the study used the descriptive approach in its correlative style, and the questionnaire was used as a tool for data collection, as it was applied to a simple random of (310) members of the faculty and staff. University of Tabuk. The results showed that the degree of digital leadership applicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
Evaluation Of Electromagnetic Pollution Of Cellular Mobile Network
...Show More Authors

Wireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF