Preferred Language
Articles
/
_BdkL48BVTCNdQwCk13t
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

Crossref
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Proposed Mechanism for Financial Reporting on Sustainable Investment and Its Role in Achieving Value Added - Applied in the Iraqi Midland Refineries Company-
...Show More Authors

The research aims to develop a proposed mechanism for financial reporting on sustainable investment that takes the specificity of these investments.

To achieve this goal, the researcher used (what if scenario) where the future financial statements were prepared for the year 2026, after completion of the sustainable project and operation, as the project requires four years to be completed.

The researcher relied on the results of the researchers collected from various modern sources relevant to the research topic and published on the internet, and the financial data and information obtained to assess the reality of the company's activity and its environmental, social, and economic i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 15 2024
Journal Name
Ieee Sensors Journal
Surface Crack Size Estimation Based on Quantification and Decoupling of Magnetic Flux Leakage (MFL) Signals of Circular Array Sensors
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Impact of Azadirachta indica Fruit Mucilage on particle size and swelling index in Central Composite Designed Acyclovir mucoadhesive microspheres
...Show More Authors

The drive of this exploration is to investigate the mucoadhesive assets of A. indica (Azadirachta indica) fruit mucilage by incorporating it into mucoadhesive microspheres with Acyclovir (AVR) as a model drug. The study was performed to check the impact of the mucilage proportion on particle size and swelling index. Nine batches of AVR mucoadhesive microspheres were made with varying proportions of Polyacrylic acid 934P and A. indica fruit mucilage (AIFM). A central composite design with design expert software to check the impact of dependent variables (A. indica mucilage and Polyacrylic acid 934 P levels) on particle size and swelling index as a response. As part of congeniality studies, the batches w

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Effect of Strategic Foresight on Achieving Strategic Entrepreneurship: Applied Research1
...Show More Authors

he current research aims to determine the extent of interest of the Oil Products Distribution Company (OPDC) and its various departments in the process of strategic foresight (SF), and the extent of interest that is reflected in the achievement of strategic leadership (SE). As well as knowing the nature of the relationship and the impact on the company. To achieve the objectives of the research, one main hypothesis was formulated, and three sub-hypotheses emerged from it. As the research relied on an analytical survey approach, the research targeted the workers within this company, And he reached a set of results, based on which a number of conclusions were formulated. The research community consisted of (185) individuals, and (160)

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Controller work specificity and their impact on performance (Applied Study in the financial oversight bodies)
...Show More Authors

The research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Linguistic and Conceptual Equivalence of Conner’s Revised Scales When Applied on a Sudanese Sample
...Show More Authors

This study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref