Preferred Language
Articles
/
Khc_Po8BVTCNdQwCSWWS
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (43)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PC-Based Controller for Shell and Tube Heat Exchanger
...Show More Authors

PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Auditor's Evaluation of The Detected Misstatements and Their Reflection on The Administration's Actions is: an Applied Research in the General Company for Grain Processing
...Show More Authors

Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones.  The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
The 2nd Universitas Lampung International Conference On Science, Technology, And Environment (ulicoste) 2021
Investigation of the vibrational spectral and electronic properties for ZnxBe7-xO7 wurtzoid via DFT approximation
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu May 09 2024
Journal Name
Polymer Bulletin
Synthesis, characterization and investigation of liquid crystalline properties for some cross-link polymers containing melamine
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 09 2024
Journal Name
Polymer Bulletin
Synthesis, characterization and investigation of liquid crystalline properties for some cross-link polymers containing melamine
...Show More Authors

In this study, condensation polymerization was used to synthesize a number of novel liquid crystal polymers with 1,3,4-oxadiazole rings based on melamine. The new synthesized polymers were characterized by Fourier transform infrared (FTIR) and proton nuclear magnetic resonance (1HNMR) spectroscopy. Differential scanning calorimetry (DSC) and optical polarization microscopy (OPM) were used to investigate their liquid crystalline properties. The results demonstrated that throughout a wide temperature range, most of the polymers exhibited columnar (CohX) and nematic (N) liquid crystalline phases.

Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
The Functional Results of Surgical Percutaneous Joystick Reduction Therapy for Isolated Severely Angulated Radial Neck Fracture in Children
...Show More Authors

Background: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture i

... Show More
View Publication Preview PDF