Preferred Language
Articles
/
NxaEuocBVTCNdQwCsl_g
Managing sensitive data in cloud computing for effective information systems’ decisions
...Show More Authors

Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Vapor-Liquid-Liquid Equilibrium (VLLE) Data for the Systems Ethyl acetate + Water, Toluene + Water and Toluene + Ethyl acetate + Water at 101.3 kPa. Using Modified Equilibrium Still
...Show More Authors

Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 23 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal banking supervision requirements and their impact on the development of electronic accounting information systems: Applied research in a sample of Iraqi private banks
...Show More Authors

      Despite the availability of information technology banking features and benefits of the banking sector, they involve many risks and challenges and put in the face of the administrative authorities and regulatory institutions in the banking system, organizational matters and control sensitive and bear direct responsibility for conducting independent assessments of their regulatory and information and determine the degree of its durability and its ability to confront problems imposed by the technical challenges and technological .
And the success of the administrative authorities and regulatory institutions in achieving its objectives in the management of risks and threats oversight resulting from the act

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Aims Geosciences
Calculation and determination of radioactivity in the old district of Najaf by using the track detector CR-39 and geographical information systems (GIS) methods
...Show More Authors

This research aims to study the radiation concentration distribution of the old District of Najaf (Iraq), where 15 samples were taken from featured sites in the District, which represents archaeological, religious, and heritage sites. Track detector CR-39 was used to calculate the concentration of three different soil weights for each sample site after being exposed for a month. Geographical information systems (GIS) were used to distribute the radioactive concentration on the sites of the samples, where two interpolation methods, namely the inverse distance weight method (IDW) and the triangle irregular network method (NIT), to study the distribution of the radioactivity concentration. The study showed that the western part of the district

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use of information and communications technology to archive data: A suggested form in the Tax Audit and Examination Department of the General Tax Authority
...Show More Authors

The current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optimal Color Model for Information Hidingin Color Images
...Show More Authors

In present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Transactions On Computers
Neuromorphic System for Spatial and Temporal Information Processing
...Show More Authors

View Publication
Scopus (22)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 15% zinc sulfate solution is an effective therapy for feet odor
...Show More Authors

KE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15

View Publication
Publication Date
Thu Jan 08 2026
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref