Preferred Language
Articles
/
GRb7dYcBVTCNdQwCEVMK
Theoretical Discussion of Electron Transport Rate Constant at TCNQ / Ge and TiO<sub>2</sub> System
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 02 2017
Journal Name
Intraventricular Pressure Ventr
The Use of Rate of Increase of Intraventricular Pressure During Isovolumetric Contraction (dP/dt) in Assessment of Left Ventricular Function in Acute Coronary Syndrome
...Show More Authors

BACKGROUND: Acute coronary syndrome (ACS) is the clinical manifestation of acutely diminished coronary arterial blood supply. The rate of increase of intraventricular pressure during isovolumetric contraction (left ventricular dP/dt) represents the rate of change of pressure during ejection. OBJECTIVE: The aim of this study is to evaluate the usefulness of the rate of increase of intraventricular pressure during isovolumetric contraction (dP/dt) in assessment of left ventricular function in patients with acute coronary syndrome and its relation to certain clinical and echocardiographic features. PATIENTS AND METHODS: The study is a cross sectional study including 50 patients with an established diagnosis of acute coronary syndrome. The

... Show More
Publication Date
Sun Aug 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the capital increase in the rate of return on stock price: Applied in the study of a sample of Iraqi banks
...Show More Authors

The capital banking foundation stone upon which the bank in the practice of business activities, the more capital a good financial adequacy of the increased bank's ability to grant credit and expand the various activities and provide a safety element for depositors and other sources of funding to achieve profits and increase the trading volume of the shares, causing the rise the rate of return for the shares of banks and have the Central Bank as head of the banking system by issuing instructions capital increase banking, according to the requirements of economic development and increase gross domestic product by supporting investment projects that are financed through banks, the research aims to show the extent of the banks commitment to

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
مجلة آداب المستنصرية
(Semantic expansion in the Arabic system)
...Show More Authors

The principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.

View Publication Preview PDF
Publication Date
Sun Apr 14 2019
Journal Name
Political Sciences Journal
The political system in North Korea
...Show More Authors

النظام السياسي في كوريا الشمالة

View Publication
Crossref