Preferred Language
Articles
/
TxblsocBVTCNdQwCzVsv
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Aug 20 2021
Journal Name
Iop Conf. Series: Materials Science And Engineering
Synthesis, identification, antibacterial, and dyeing applications of complexes of hexadentate (N4O2 donor) Schiff base ligands derived from curcumin with some transition and non–transition metal cations
...Show More Authors

Schiff base ligand (H2CANPT) was prepared by two steps: first, by the condensation of curcumin with 4-amino antipyrin produces4,4'-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3- methoxyphenyl)hepta-1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl- 1,2-dihydro-3H-pyrazol-3-one) (CANP). Second, by the condensation of (CANP) with L-tyrosine produces2,2'-(((3Z,3'Z)-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3-methoxyphenyl)hepta 1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl-1,2-dihydro-3-H-pyrazole- 4-yl-3-ylidene))bis(azanylylidene))bis(3-(4-hydroxyphenyl)propanoic acid) (H2CANPT). The resulted Schiff comported as hexadentate coordinated with (N4O2) atoms, then it was treated with some transition and non-transaction met

... Show More
Preview PDF
Publication Date
Wed Nov 13 2024
Journal Name
Al-noor Journal Of Engineering Management And Computer Science
INTELLIGENT INTERNATIONAL IDENTIFICATION CARD
...Show More Authors

This study will develop and implement the International Identification Card (IIC) to multi users (M-1). The IIC can be used in several methods such as an IC card, Passport, driver’s license, Visa card, Security Information system, Business part, all information about individuals/persons. The Smart Identification Card Technology (SICT) system will be using several new technology categories/tools such as Information Technology, Management Information Technology, Database management, internet service, Bluetooth service, NFC and mobile calling service. The target of SICT is to increase the efficiency of IC card to know the details for all citizens and foreigners from any country regardless their nationalities. What this means is the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 28 2024
Journal Name
Asia-pacific Journal Of Molecular Biology And Biotechnology
A novel method for the degradation of human blood clot by immobilised bromelain using multi-walled carbon nanotube and polyphenol oxidase
...Show More Authors

Pathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The effect of external sources in the students results in Geography subject
...Show More Authors

The research aims to identify the current (after the readings in the collection of foreign
students to the geographical material) To achieve this, the researcher developed the following
null hypothesis:
No statistically significant differences at the level of (0.05) between the average scores who
are studying the use of article readings and the average external degree students who are
studying material in the traditional manner of collection.
The researcher has chosen Qsidia middle school Amma, which includes six divisions for
Grade average, randomly selected Division (a) to represent the control group, while
representing the Division of (c) the experimental group and reached the research sample (44)
student, b

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
Technical image sources In the poetry of Muhammad Salih Bahr al-Ulum
...Show More Authors

يتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر

... Show More
View Publication Preview PDF