Preferred Language
Articles
/
_ULFrpsBMeyNPGM3St4A
Mobile ad hoc network wireless security: problems, solutions, and application: state-of-the-art
...Show More Authors

Crossref
View Publication
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
Graduate Unemployment In Iraq , Problems , Solution
...Show More Authors

There Are Many  Communities Suffering Of Unemployment Due To Has  Great Social And Economic Impact, As Well As The Psychological Effects Devastating And Serious And That May Threaten States  With Collapse And  Leading Human Displacement And Loss And Crime, And Often Derive Unemployed People To Practice  Bad Habits Such As Gambling, Alcohol And Drug Abuse To Escape From Their Reality To Their Concerns And Problems.

It Should Be Noted, That The Largest Percentage Of Unemployment In Developing Societies Represented By The Educated Class Of University Graduates, And This Is Something Painful.

The Unemployed Know That (Each Capable Of Working And Who Want To Look For And Accept Prevailing Bricks) Is Th

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
The Application of Biomimicry in Kinetic Facades
...Show More Authors

Biomimicry, as a way of thinking to go back to nature for inspiration, has its impact on many contemporary technological achievements. Some of them are used to design and construct kinetic facades in architecture, because of the importance role of facades in reducing sun radiation, that enter the building through using shading  systems and components. In light of this, research problem is determined: "Do technologies which are inspired by biomimicry effect shading in kinetic facades through its characteristics in materials and the mechanics. So the research identifies its goal as: "To identify the types of kinetic facades in buildings and their characteristics as materials and shading mechanism associated with the b

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Magna Scientia Advanced Research And Reviews
Application of Nanoparticle in the Veterinary Medicine
...Show More Authors

Nanotechnology is a modern and developed technology, which have great importance in many fields of medicine (diagnosis and treatment). Also, it used to prevent and solve many problems related to animal production and health. The Nanosystems are including metallic nanoparticles, liposomes, polymeric Nanospheres, polymeric micelles, carbon nanotubes, functionalized fullerenes, polymer-coated Nanocrystals, dendrimers and Nanoshells. Our review showed a details classification of nanoparticles and their uses. Nanoparticles have several features depended on the size, colossal surface. The development of antibiotics nanoparticle is very important and has an excellent impact in treating bacterial infections wherever the antibiotics nanopar

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Tue Feb 08 2022
Journal Name
Political Sciences Journal
The role of variables contact for non-state actors and opposite forces of civil social in ensuring the social peace
...Show More Authors

Receipt date:6/3/2021  acceptance date:4/5/2021 Publication date:31/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The research in the role of variables contact for non-state actors have become more influential in the current of contemporary events, that related with the reality of seeking services and providing all of that in favor of maintaining the social peace, and ensuring its empowerment in order to make peace and stability outcomes as a real fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 25 2026
Journal Name
Journal Of Business Economics For Applied Research
The impact of total quality management on the quality engineering of Diyala State Company's products and production processes
...Show More Authors

View Publication
Publication Date
Fri Nov 27 2020
Journal Name
Journal Of Physics: Conference Series
Investigation of the State Vectors and Prediction of the Orbital Elements for Spot-6 Satellite during 1300 periods with Perturbations
...Show More Authors
Abstract<p>Computer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4<sup>th</sup> order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Rooting non-violence in the Holy Quran And models of the Prophet application
...Show More Authors

The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Shorthand the representative performance in the theatrical festival performances of the education teams for teachers in primary schools , in secondary schools and artistic supervisors 2019 AD: خضر عبد خضير
...Show More Authors

Arts acts to reduce and exclude everything that is not necessary in the delivery of meaning, especially representative performance, which is based on the intensification of the physical and vocal actions, and in drawing the dimensions of the character. And because that, the artistic staff, among others in the ministry of education, are considered the cornerstone, in the development of theatrical activities in schools, this research came to find out the extent to which teachers in primary schools, in secondary schools and artistic supervisors rely on shorthand mechanisms in the representative performance.
The current research relied on the descriptive approach, in analyzing his sample, which was deliberately chosen, Among the most imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref