Preferred Language
Articles
/
TxblsocBVTCNdQwCzVsv
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Aip Conf. Proc. 2450, 020031 (2022)
The study of the identification and association of adiponectin and Interleukin-6 and some variables. Biochemical parameters in the Iraqi cord blood of newborns
...Show More Authors

t. The current study was conducted on the umbilical cord blood of newborns in the Banks Hospital in Baghdad, Diyala, and Khalis in Diyala, where the study included 90 samples of blood, and samples were collected for the period from the 1st of October;2020 to The first of February;2021 AD, where the study included measuring levels of interleukin-6;Adiponectin,glucose and bilirubin in the blood, comparison study between the study variables with the child's weight (greater than 3 kg),(less or equal 3 kg),the mother's age (greater than 25 years, less or equal to 25 years),the sex of the child (male, female).The results of our study showed that there were no significant differences between the variables of the current study between the two sex

... Show More
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Applied Numerical Mathematics
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

View Publication
Scopus (28)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
Ibn Abi Shaybah's responses to Abu Hanifa in the evidence that he claimed to violate in the transactions In the doctrinal balance
...Show More Authors

Imam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.

View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Translational Andrology And Urology
Robotic-assisted magnetic resonance imaging ultrasound fusion results in higher significant cancer detection compared to cognitive prostate targeting in biopsy naive men
...Show More Authors

View Publication
Scopus (12)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Sat Sep 08 2018
Journal Name
Proceedings Of The 2018 International Conference On Computing And Big Data
3D Parallel Coordinates for Multidimensional Data Cube Exploration
...Show More Authors

Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Traffic management inside software-defined data centre networking
...Show More Authors

In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur

... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (87)
Crossref