Preferred Language
Articles
/
RhfykI8BVTCNdQwC8XsG
An Efficient Method for Heat Recovery Process and燭emperature燨ptimization
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Sep 01 2018
Journal Name
International Journal Of Electrochemical Science
Synthesis and Characterization of AlyCu0.15Zn0.85-yFe2O4 Ferrite Prepared by the Sol-Gel Method
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Advances In Condensed Matter Physics
Electrical and Optical Properties of :H Thin Films Prepared by Thermal Evaporation Method
...Show More Authors

Thin a-:H films were grown successfully by fabrication of designated ingot followed by evaporation onto glass slides. A range of growth conditions, Ge contents, dopant concentration (Al and As), and substrate temperature, were employed. Stoichiometry of the thin films composition was confirmed using standard surface techniques. The structure of all films was amorphous. Film composition and deposition parameters were investigated for their bearing on film electrical and optical properties. More than one transport mechanism is indicated. It was observed that increasing substrate temperature, Ge contents, and dopant concentration lead to a decrease in the optical energy gap of those films. The role of the deposition conditions on value

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Structural and optical properties of Fe- doped ZnO thin films prepared by Sol–Gel spin coating process and their photocatalytic activities
...Show More Authors

Pure and Fe-doped zinc oxide nanocrystalline films were prepared
via a sol–gel method using -
C for 2 h.
The thin films were prepared and characterized by X-ray diffraction
(XRD), atomic force microscopy (AFM), field emission scanning
electron microscopy (FE-SEM) and UV- visible spectroscopy. The
XRD results showed that ZnO has hexagonal wurtzite structure and
the Fe ions were well incorporated into the ZnO structure. As the Fe
level increased from 2 wt% to 8 wt%, the crystallite size reduced in
comparison with the pure ZnO. The transmittance spectra were then
recorded at wavelengths ranging from 300 nm to 1000 nm. The
optical band gap energy of spin-coated films also decreased as Fe
doping concentra

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2007
Journal Name
University Of Baghdad
The Psychic Experience and its Effects on the Creative Process: A Study in Selected Poems By Allen Ginsberg and David Gascoyne
...Show More Authors

Evidences indicate that human beings were preoccupied with extreme forms of mental and psychic experiences long before they were recorded in literature. Greek myths and legends appear to include symbolizations of delusions, mania, and other bizarre forms of thought and behaviuor. The figure of the mad man or woman is analogous to the wild man, or the imaginary being who appears in various forms throughout western literature and art. Various studies refer to the notion of the wild man as a response to a persistent psychological urge. This urge gives an external expression and a valid form to the impulses of reckless physical self-assertion which is believed to be hidden in all of us, but is normally kept under control. Such impulses were exp

... Show More
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More