Preferred Language
Articles
/
ORYoqYcBVTCNdQwC2lrN
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and solve the problem of accumulation, collection and analysis of data by storing it with large, expanded and automatically interconnected databases between university places and departments to provide services adapted to the desire of demand. This research dealt with a sample from of the academic’s opinions and students. The sample is 319 questionnaires. It concluded that each of the infrastructure, devices, Internet of things, smart classrooms, and administrative database, with the presence of the fifth-generation network and its equipment, have a statistically significant correlation with technical education technology.

Scopus Crossref
View Publication
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
PHYTOREMEDIATION OF SYNTHETIC WASTEWATER CONTAINING COPPER BY USING NATIVE PLANT
...Show More Authors

This study was aimed to assess the efficiency of N.oleander to remove heavy metals such as Copper (Cu) from wastewater. A toxicity test was conducted outdoor for 65-day to estimate the ability of N.oleander to tolerate Cu in synthetic wastewater. Based on a previous range-finding test, five concentrations were used in this test (0, 50, 100, 300, 510 mg/l). The results showed that maximum values of removal efficiency was found 99.9% on day-49 for the treatment 50 mg/l. Minimum removal efficiency was 94% day-65 for the treatment of 510 mg/l. Water concentration was within the permissible limits of river conservation and were 0.164 at day-35 for the 50 mg/l treatment, decreased thereafter until the end of the observation, and 0.12 at d

... Show More
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Applied Sciences
Improvement of Mechanical Welding Properties by using Induced Harmonic Vibration
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
World Journal Ofexperimentalbiosciences
transformation of Saccharomyces cerevisiae by PET plasmid using lithium acetate
...Show More Authors

Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Asian Journal Of Water, Environment And Pollution
Biosorption of Pollutants in Diyala River by Using Irrigated Vegetables
...Show More Authors

In the absence of environmental regulation, food stays to be contaminated with heavy metals, which is becoming a big worry for human health. The present research focusses on the environmental and health effects of irrigating a number of crops grown in the soils surrounding the Al-Rustamia old plant using treated wastewater generated by the plant. The physicochemical properties, alkalinity, and electrical conductivity of the samples were evaluated, and vegetable samples were tested for Cd, Pb, Ni, and Zn, levels, and even the transfer factor (TF) from soils to crops and crop and multi-targeted risk, daily intake (DIM) of metals, and health risk index (HRI) was calculated. The findings found that the average contents of Zn, Pb, Ni, an

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Decisions making for fraction functions By Using Goal Programming Method
...Show More Authors

Decision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
The Iraqi Journal Of Agricultural Science 48 (5), 1197-1205‏
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref