Preferred Language
Articles
/
ORYYSYkBVTCNdQwC9Yjw
Bayes estimators of a multivariate generalized hyperbolic partial regression model
...Show More Authors

Scopus
View Publication
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (93)
Crossref (83)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Sensitize the electrical properties of partial substitution on mercury-base superconductor manufactured by the solid reaction method
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
مجلة كلية التربية الاساسية
Study the Partial Molar Volume of Chrom Alum in Aqueous Poly (ethylene glycol) Solution at Different Temperature
...Show More Authors

This study present, the density of alum chrom in water and in aqueous solution of poly (ethylene glycol) (1500) at different temperature (288.15, 293.15, 298.15) k. Experimental values of density was used to calculate the apparent molar volume (Vθ), limiting apparent molar volume Vθ˚, experimental slope (Sv) and the partial molar volume at infinite dilution of transfer of solute Δνθ˚. These results have been interpreted the molecular interaction in term of ion- solvent, ion– ion interaction. The structure making /breaking capacities have been inferred from the sign of the second derivative of limiting partial molar volume with respect temperature at constant pressure. Alum has been formed to act as structure breaker in water and aq

... Show More
Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Effects of international variables on the principle of citizenship in Arab countries: "Kuwait as a Model"
...Show More Authors

The principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.

The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.

The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The design of a proposed model for the application of the insurance policy for medical errors
...Show More Authors

The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 26 2019
Journal Name
International Journal Of Mathematics And Mathematical Sciences
Stability and Bifurcation of a Prey-Predator-Scavenger Model in the Existence of Toxicant and Harvesting
...Show More Authors

In this paper a prey-predator-scavenger food web model is proposed and studied. It is assumed that the model considered the effect of harvesting and all the species are infected by some toxicants released by some other species. The stability analysis of all possible equilibrium points is discussed. The persistence conditions of the system are established. The occurrence of local bifurcation around the equilibrium points is investigated. Numerical simulation is used and the obtained solution curves are drawn to illustrate the results of the model. Finally, the nonexistence of periodic dynamics is discussed analytically as well as numerically.

Scopus (34)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Future of Mathematical Modelling: A Review of COVID-19 Infected Cases Using S-I-R Model
...Show More Authors

The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Endoscopic Partial Lateral Middle Turbinectomy versus middle Turbinat Trimming in Adult patients with Concha Bullosa
...Show More Authors

Background: Concha bullosa is an anatomical variation which defined by pneumatizaton of middle turbinate that occurred with an incidence of (5 to 25%) in the normal population.It has the potential to cause crowding and obstruction of the middle meatus and nasal cavity. There are many surgical techniques which utilized for its management. Study goal: Is to compare the formation of adhesion between endoscopic partial lateral middle turbinectomy and middle turbinate trimming in cases of concha bullosa. Patients and methods: A prospectivecomparative clinical trial was performed in the ENT department at Al-Shahid Ghazi AL Hariri Hospital in Medical City over the period from September 2016 to August 2017. Fifty nine (59) patients {24 males

... Show More