Preferred Language
Articles
/
GRZZgYcBVTCNdQwCHFQg
Reducing False Notification in Identifying Malicious Application Programming Interface (API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Sat Jun 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An in-vitro scan electron microscope comparative study of dentine-Biodentine interface
...Show More Authors

Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m

... Show More
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the performance of inspectors general offices in reducing corruption According to global indicators(Field research comparative)
...Show More Authors

Abstract

        This research aims to evaluate the application of the inspectors general of global indicators offices according to the axles (leadership, strategy and planning, employees, partners and resources, process management) and through the assumption main research which states that (there is an application for global indicators to evaluate performance in the offices of the ministries under study) which are subdivided into five sub-hypotheses according to the classification and division of the five axes of the checklist.

The researchers have taken refuge in the process of assessing the performance of the check list which included global i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use Simulation To Differentiate Between Some Modern Methods To the Model GM(1,1) To Find Missing Values And Estimate Parameters With A Practical Application
...Show More Authors

Abstract

       The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a he

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Role of Value Chain Analysis as well as Programs and Performance Budget in Reducing Waste of Public Money(Applied Study)
...Show More Authors

Programs and performance budget represents a sophisticated method of public budget numbers, which includes all allocations to be determined for each job or activity within a government entity, which is analyzed according to their needs and costs, and this method can be applied using one of the cost accounting techniques, which is the technique of analyzing the value chain that reduces costs by avoiding activities that do not add value and enhance activities that add value to the economic entity, the current research aims to develop the budget system in government entity by using the budget of programs and performance as a tool for planning and monitoring events and activities, thereby reducing the waste of public money by reducing unnecessa

... Show More
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Laplace Distribution And Probabilistic (bi) In Linear Programming Model
...Show More Authors

The theory of probabilistic programming  may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, pro­duction and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of Mathematical Analysis And Applications
Strong duality for generalized monotropic programming in infinite dimensions
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Using Spatial Analysis Methods to Evaluate the Soil Contamination of Baghdad City, Iraq
...Show More Authors
Abstract<p>The current study aims to identify soil pollutants from heavy metals The study utilized 40 topsoil (5 cm) samples, which adapted and divided into seven regions lies in Baghdad governorate, included (Al-Husainya,(Hs) Al-Doura (Do), Sharie Al-Matar (SM), Al-Waziria (Wz), Nharawan (Nh), Abu Ghraib (Abu) and Al-Mahmoodyia (Mh)). Spatial distribution maps of Nickel (Ni), Manganese (Mn), Lead (Pb) and Zinc (Zn) were created for Baghdad city using Geographic Information Systems (GIS). The concentrations of four heavy metals in the soil of different area of Baghdad were measured and observed using XRF instrument. The result found highest values of Pb and Zn at the middle of the Baghdad in (Wz</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref