Preferred Language
Articles
/
NxaEuocBVTCNdQwCsl_g
Managing sensitive data in cloud computing for effective information systems’ decisions
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Estimating the Parameters of Exponential-Rayleigh Distribution under Type-I Censored Data
...Show More Authors

     This paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number o

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Investigating the quality of open street map roads data inside Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Applied Mathematical Modelling
Identification of a multi-dimensional space-dependent heat source from boundary data
...Show More Authors

View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Sustainability
Effect of Biofertilizer in Organic and Conventional Systems on Growth, Yield and Baking Quality of Hard Red Winter Wheat
...Show More Authors

A two-year study (harvest years 2019 and 2020) was conducted to investigate the effect of a commercially available biofertilizer, in combination with variable nitrogen (N) rate, on bread baking quality and agronomic traits in hard winter wheat grown in conventional (CONV) and organic (ORG) farming systems in Kentucky, USA. The hard red winter wheat cultivar ‘Vision 45’ was used with three N rates (44, 89.6 and 134.5 kg/ha as Low, Med and High, respectively) and three biofertilizer spray regimes (no spray, one spray and two sprays). All traits measured were significantly affected by the agricultural production system (CONV or ORG) and N rate, although trends in their interactions were inconsistent between years. In Y2, yield was

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The problem and its manifestations with the modernists through the Iberissian systems in modern terminology (applied study): (Applied study)
...Show More Authors

Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
     It is known that the Sunnah commanded to follow is the

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Baghdad Science Journal
Seasonal variation and modeling of disinfection by-products (DBPs) in drinking water distribution systems of Wassit Province Southeast Iraq
...Show More Authors

Scopus (8)
Scopus