Preferred Language
Articles
/
Txa0yIcBVTCNdQwCj2F5
Practical Study for the Properties of Hueckel Edge Detection Operator
...Show More Authors

Crossref
View Publication
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Air Gap Effect on the Properties of Unsaturated Symmitrical Double Polepiece Lenses
...Show More Authors

The  preferable  design  for  unsaturated  symmetrical  spherical

double-pole  piece electron  lens required good focal properties,  and in this  present  study  investigate  effect  of  air  gap  wide  (S)  on  the properties  of  the  projector  lens  specialized  the  minimum  projector

focal  length  1Fr) .     and  the  properties  of  the  axial  magnetic  field

\            lnlll

distribution:(the   maximum

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
The Structure and Electrical Properties of Porous Silicon Prepared by Electrochemical Etching
...Show More Authors

Porous silicon was prepared by using electrochemical etching process. The structure, electrical, and photoelectrical properties had been performed. Scanning Electron Microscope (SEM) observations of porous silicon layers were obtained before and after rapid thermal oxidation process. The rapid thermal oxidation process did not modify the morphology of porous layers. The unique observation was the pore size decreased after oxidation; pore number and shape were conserved. The wall size which separated between pore was increased after oxidation and that effected on charge transport mechanism of PS

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering Science And Technology
Using sustainable material in improvement the geotechnical properties of soft clayey soil
...Show More Authors

Preview PDF
Scopus (42)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
فارسی Practical application of Jean René Ladmiral's model in translation from Arabic to Persian: کاربست عملی الگوی ژان رنه لادمیرال در ترجمه از عربی به فارسی
...Show More Authors

Translation is a dynamic and living process that cannot be considered equal to the original text and requires the appropriate structure, language, thought and culture of the target language, and the translator's intellectual, linguistic and cultural influences inadvertently penetrate into the translated text. It causes heterogeneity of the destination text with the source text.

Admiral's theory is trying to help by providing components and suggested approaches to resolve these inconsistencies. In the meantime, in addition to the mission of putting words together, the translator must sometimes sit in the position of the reader and judge and evaluate the translated text in order to understand its shortcomings and try to correct it a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref