Preferred Language
Articles
/
XhbztIcBVTCNdQwCVl2v
Synthesis and Study NiO Charactrization of Extract from Green Tea Plant Prepared by Chemical Method
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Effect of spraying fertilizer paper and aqueous extract of licorice in the content of the fruits of two varieties of sweet peppers total Azaúbh solids and vitamin
...Show More Authors

Studied the effect of foliar fertilizers Alaongrin results showed that spraying fertilizer Alaongrin and Fertilizers and Ministry of Agriculture and rack licorice extract every three weeks after thirty days from planting seedlings

View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Stages of integration scenarios with strategic management From the perspective of study the historical development of scenarios
...Show More Authors

Purpose: The present study seeks to examine various history stages in which undergone by the concept of scenarios, and development of this concept to integration with the strategic management practices:
Methodology: The current study relied on a literature review and approach in providing total picture of different stages undergone by this concept.
The main results: the scenarios did not reach maturity in their quest for integration with strategic management, and still need a great effort for the maturation of this thought in the framework of strategic management, and through it can contribute in creating important knowledge evolution.
Originality and value: providing a contemporary model linking the roots of this concept and cu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Reviews In Medical Microbiology
Molecular study of some virulence genes of Pseudomonas aeruginosa isolated from different infections in hospitals of Baghdad
...Show More Authors

One hundred isolates of Pseudomonas aeruginosa were obtained from patients admitted to Baghdad hospitals, Iraq during the period between May 2018 until July 2018. These isolates were distributed as 15 isolates from blood, 25 isolates from urinary tract infections, 10 isolates from sputum, 12 isolates from wounds, 15 isolates from ear infections, 15 isolates from bronchial wash of patients suffering from respiratory tract infections in addition to 8 isolates from cystic fibrosis patients. The isolates were initially identified by culturing on MacConkey agar, blood agar and P. aeruginosa agar then diagnosed by performing some morphological and biochemical tests. The second diagnosis was done by API 20E system followed by Vitek 2 compact syste

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Comparing Study of The Stability and spectral properties vibrations for some Tellurium (IV) compounds containing cycloctadienyl group by Quantum Mechanical Calculations
...Show More Authors

Density Functional Theory (DFT) with B3LYP hybrid exchange-correlation functional and 3-21G basis set and semi-empirical methods (PM3) were used to calculate the energies (total energy, binding energy (Eb), molecular orbital energy (EHOMO-ELUMO), heat of formation (?Hf)) and vibrational spectra for some Tellurium (IV) compounds containing cycloctadienyl group which can use as ligands with some transition metals or essential metals of periodic table at optimized geometrical structures.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Combining Bourgoyne and Young Equations by Bagging Tree Regression to Predict Rate of Penetration in a Southern Iraqi Field, Case Study
...Show More Authors
Abstract<p>Achieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 02 2022
Journal Name
Periodicals Of Engineering And Natural Sciences
Histological and immunohistochemical study of thyroid gland in Caucasian squirrel (Sciurus anamalus) (Gmelin, 1778) by using marker (Anti-Thyroglobulin, Code IR5090)
...Show More Authors

The current study is designed to investigate the histological and immunohistochemical characteristics of the thyroid gland in adult male Sciurus anamalus. This study found that the thyroid gland of the Caucasian squirrel is located in the neck area, below the larynx, on both sides of the trachea. It has two lobes (right and left) with cylindrical shape. The histological studies revealed that the thyroid gland is surrounded by a capsule which consists of connective tissue and forming of two layers which are outer layer and inner layer, and a layer of adipose tissue appears overlapping the outer layer. The inner tissue of the gland consists of follicles with different shapes and sizes, and is lined with simple cuboidal epithelial tissue (foll

... Show More
Publication Date
Wed Dec 28 2022
Journal Name
Periodicals Of Engineering And Natural Sciences
Histological and immunohistochemical study of thyroid gland in Caucasian squirrel (Sciurus anamalus) (Gmelin, 1778) by using marker (Anti-Thyroglobulin, Code IR5090)
...Show More Authors

The current study is designed to investigate the histological and immunohistochemical characteristics of the thyroid gland in adult male Sciurus anamalus. This study found that the thyroid gland of the Caucasian squirrel is located in the neck area, below the larynx, on both sides of the trachea. It has two lobes (right and left) with cylindrical shape. The histological studies revealed that the thyroid gland is surrounded by a capsule which consists of connective tissue and forming of two layers which are outer layer and inner layer, and a layer of adipose tissue appears overlapping the outer layer. The inner tissue of the gland consists of follicles with different shapes and sizes, and is lined with simple cuboidal epithelial tissue (foll

... Show More