Preferred Language
Articles
/
GRZZgYcBVTCNdQwCHFQg
Reducing False Notification in Identifying Malicious Application Programming Interface (API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Sat Aug 10 2024
Journal Name
American Journal Of Economics And Business Innovation
Factors Associated with Employees’ Intention to Leave in ICT Sector in Iraq: A Factor Analysis
...Show More Authors

The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Estimation Methods for Mixed-Random Panel Data Regression Models with Serially Correlated Errors with Application
...Show More Authors

This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Linear Programming problems
...Show More Authors

ان الغرض من هذا البحث هو المزج بين القيود الضبابية والاحتمالية. كما يهدف الى مناقشة اكثر حالات مشكلات البرمجة الضبابية شيوعا وهي عندما تكون المشكلة الضبابية تتبع دالة الانتماء مرة دالة الاتنماء المثلثية مرة اخرى، من خلال التطبيق العملي والتجريبي. فضلا عن توظيف البرمجة الخطية الضبابية في معالجة مشكلات تخطيط وجدولة الإنتاج لشركة العراق لصناعة الأثاث، وكذلك تم استخدام الطرائق الكمية للتنبؤ بالطلب واعتماده

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Identifying Failure Factors in the Implementation of Residential Complex Projects in Iraq
...Show More Authors

Residential complexes have witnessed a great demand in most countries worldwide, as they are one of the main infrastructure elements, in addition to achieving a developed urban landscape. However, complex residential projects in developing countries face various factors that could be improved in their implementation, especially in Iraq. Sixty-two experts in residential complex projects were interviewed and surveyed to verify these projects' failure factors,. Fifty-one factors were the main failure factors, divided into four main components (leadership, management system, external forces, and project resources). The Relatively Important Index (RII) is used to determine the relative importance factors and obtain the top tw

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
A Review of Interface Bonding Testing Techniques
...Show More Authors

Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
A Review of Interface Bonding Testing Techniques
...Show More Authors

Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength

... Show More
View Publication Preview PDF
Crossref (2)
Crossref