Preferred Language
Articles
/
PRZUR4gBVTCNdQwC2nbj
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Sep 12 2017
Journal Name
Nucl Sci Tech
Investigating the influence of gamma ray energies and steel fiber on attenuation properties of reactive powder concrete
...Show More Authors

Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Time and Corrosion Products Formation on Corrosion Rate of Carbon Steel Pipe Under Turbulent Flow Conditions
...Show More Authors

The effect of time (or corrosion products formation) on corrosion rates of carbon steel pipe in aerated 0.1N NaCl
solution under turbulent flow conditions is investigated. Tests are conducted using electrochemical polarization
technique by determining the limiting current density of oxygen reduction in Reynolds number range of 15000 to 110000
and temperature range of 30 to 60oC. The effect of corrosion products formation on the friction factor is studied and
discussed. Corrosion process is analyzed as a mass transfer operation and the mass transfer theory is employed to
express the corrosion rate. The results are compared with many proposed models particularly those based on the
concept of analogy among momentum, heat,

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 02 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effects of additives in to heat treatment temperature and time on the crystallinity of lithium silicate glass-ceramic
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Supply Chain Management
The effect of internal training and auditing of auditors on supply chain management: An empirical study in listed companies of Iraqi stock exchange for the period 2012-2015
...Show More Authors

Scopus (31)
Scopus
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref