Preferred Language
Articles
/
JxYNBYcBVTCNdQwCYi4b
Methods and Challenges in Shot Boundary Detection: A Review

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
THE REALITY OF THE AGRICULTURL SECTOR IN IRAQ AND CHALLENGES FACING THE FUTURE

سعي المجتمع العراقي منذ أكثر من نصف قرن مضى لإعادة استثمار عشرات المليارات من الدولارات من الإيرادات النفطية في القطاع الزراعي وهياكله وبنياته التحية، كإنشاء السدود والخزانات المائية واستصلاح الأراضي والمشاريع الإنتاجية الحيوانية والنباتية وبطاقات كادت تقترب او تتجاوز حاجز طلب السكان من الأغذية والمنتوجات الزراعية التي تغذي الصناعة الا ان الزيادة السكانية وتحسن مستوى الدخل النفطي شكلا انتقالا جدي

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Scoping Review of Machine Learning Techniques and Their Utilisation in Predicting Heart Diseases

Heart diseases are diverse, common, and dangerous diseases that affect the heart's function. They appear as a result of genetic factors or unhealthy practices. Furthermore, they are the leading cause of mortalities in the world. Cardiovascular diseases seriously concern the health and activity of the heart by narrowing the arteries and reducing the amount of blood received by the heart, which leads to high blood pressure and high cholesterol. In addition, healthcare workers and physicians need intelligent technologies that help them analyze and predict based on patients’ data for early detection of heart diseases to find the appropriate treatment for them because these diseases appear on the patient without pain or noticeable symptoms,

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Tikrit Journal For Dental Sciences
Aligning Archwires in Orthodontics: Exploring the Past, Present, and Future - A Comprehensive Narrative Review

Orthodontic wires facilitate the required dental adjustments in the context of orthodontic therapy. The archwire has played a crucial role in orthodontic treatment, and the increasing emphasis on aesthetic preferences from patients, as well as the development of composite and ceramic brackets, have prompted investigations into aesthetic archwires that complement these brackets. Orthodontic wires are produced using a diverse range of materials. The utilisation of all available wire types can improve patient comfort, decrease chairside time, and shorten the overall duration of treatment. The individual clinician must possess comprehensive knowledge and comprehension of the various requirements and alternatives throughout the therapeut

... Show More
Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
U.S.A. Contemporary Foreign Policy Options & Challenges

It is out of question that USA foreign policy has a great superiority and
influence all over the world.
This study deals with all dimensions; aims; and challenges of the American
foreign policy. It aims to answer the following question: within the current changes in
the world, how can the aims of the American foreign policy be realized?

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On E-learning, E-management And E-services (ic3e)
Scopus (6)
Crossref (5)
Scopus Crossref
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Evaluation the Mechanical Properties of Shot Peened TIG Welded Aluminum Sheets

A tungsten inert gas (TIG) welding is one of the most popular kinds of welding used to join metals mainly for aluminum alloys.  However, many challenges may be met with this kind of joining process; these challenges arise from decay of mechanical properties of welded materials. In the present study, an attempt was made to enhancing the mechanical properties of TIG weld joint of 6061-T6 aluminum alloy by hardening the surfaces using shoot peening technique. To optimize the shoot peening process three times of exposure (5, 10, and 15) min. was used. All peened and unpeened, and welded and unwelded samples were  characterized by metallographic test to indicate the phase transformation and modification in microstructure occurring d

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2016
Journal Name
Applied Organometallic Chemistry
Synthesis and antioxidant activities of Schiff bases and their complexes: a review

Schiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.

Scopus (187)
Crossref (172)
Scopus Clarivate Crossref
View Publication Preview PDF