Preferred Language
Articles
/
HBbhuYcBVTCNdQwCnF9l
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Thu Nov 19 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Enhanced Multistage RSA Encryption Model
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Solving Optimal Control Linear Systems by Using New Third kind Chebyshev Wavelets Operational Matrix of Derivative
...Show More Authors

In this paper, a new third kind Chebyshev wavelets operational matrix of derivative is presented, then the operational matrix of derivative is applied for solving optimal control problems using, third kind Chebyshev wavelets expansions. The proposed method consists of reducing the linear system of optimal control problem into a system of algebraic equations, by expanding the state variables, as a series in terms of third kind Chebyshev wavelets with unknown coefficients. Example to illustrate the effectiveness of the method has been presented.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
USE OF CLAY MINERAL IN WESTERN ALANBAR DESERT AND USING FOR CRUDE OIL FRACTIONATION (ALQAYAIRA CRUDE): USE OF CLAY MINERAL IN WESTERN ALANBAR DESERT AND USING FOR CRUDE OIL FRACTIONATION (ALQAYAIRA CRUDE)
...Show More Authors

In this research, a number of the western al-Anbar clays (red iron clays, Attapulgite) were modified by treating them thermally with a temperature of 650oC. After that, these clays reflux with sodium hydroxide 5% for 1 hour by using microwave as a power supply. The research included fractionation alqayaira crude oil the fractionation included removing the asphaltene by precipitation from the crude using a simple paraffin solvent (normal hexane) as a non-soluble substance. After that it was filtered using the ash-free filter paper 42, the dissolved part, maltinate, was taken, drying a temperature of 75oC and weight, and to find the percentage of the two parts. Malatine was divided into three main parts (paraf

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The role of knowledge management strategies in building core competenciesAn exploratory study of the views of a sample of managersOffice of Financial Supervision in Iraq
...Show More Authors

The strategies of knowledge management have became the basis in the promotion of core competencies. Therefore gained an increasing prominence. This led the administrations of organizations to work to effectiveness of there strategies, which results to build there core competences through teamwork, empowerment and personal effectiveness of employees. From this arises research problem about the  organizations leaders recognize extent of knowledge management strategies which that lead to core competence. In addition the research tray definition the relation and nature of affect between its variables. The research was carried on sample (72) managers from board of supreme audit in Iraq and used statistical tools and methods.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Health Sciences
Molecular assessment of some cardiovascular genetic risk factors among Iraqi patients with ischemic heart diseases
...Show More Authors

Abstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed

... Show More
View Publication
Publication Date
Wed Jan 05 2022
Journal Name
Journal Of Positive School Psychology
Influence Of Variance In Rest Interval For The Explosive Power Training For The Arms And Legs In The Light Of Some Biochemical Indicators For The Cellular Equilibrium Of The Volleyballers
...Show More Authors

Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo

... Show More
Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref