Preferred Language
Articles
/
YxfCOo8BVTCNdQwCDGTo
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Family Atmosphere and Relationship to Academic Adjustment for Student at Baghdad University
...Show More Authors

The research aimed: 1. Definition of family climate for the university students. 2. Definition of statistical significance of differences in family climate variable depending on the sex (males - females) and specialization (Scientific - humanity). 3. Definition of academic adjustment for university students. 4. Definition of correlation between climate and academic adjustment. The research sample formed of (300) male and female students by (150) male of scientific and humanitarian specialization and (150) female of scientific and humanitarian specialization randomly selected from the research community. To achieve the objectives of the research the researcher prepared a tool to measure family climate. And adopted the measure (Azzam 2010)

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Econometrics analysis of the impact of external shocks on foreign direct investment in Iraq for the period (1995-2016)
...Show More Authors

The external shocks are one of the phenomena that the Iraqi economy is exposed to over a period of time. It is referred to as changes and events that come from outside the economic system and extends to many economic variables. However, foreign direct investment may be severely affected due to the extreme sensitivity to changes and local and international developments. This type of trauma and its characteristics to help manage and cope with external shocks, and in order to avoid the standard problems experienced by some models of simple linear regression, multi-linear regression models were used with variables Scientific and other dummy variables .

        The study foun

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Mon Nov 09 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L: The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L
...Show More Authors

The plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 24 2024
Journal Name
Mathematics
Identification of Time-Wise Thermal Diffusivity, Advection Velocity on the Free-Boundary Inverse Coefficient Problem
...Show More Authors

This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF