Preferred Language
Articles
/
bsj-4400
Continuous On-Line Tar Measurements for Gasification Process Monitoring using Fluorescence Excitation-Emission Matrices at Elevated Temperature
...Show More Authors

Biomass has been extensively investigated, because of its presence as clean energy source. Tars and particulates formation problems are still the major challenges in development especially in the implementation of gasification technologies into nowadays energy supply systems. Laser Induced Fluorescence spectroscopy (LIF) method is incorporated for determining aromatic and Polycyclic Aromatic Hydrocarbons (PAH) produced at high temperature gasification technology. The effect of tars deposition when the gases are cooled has been highly reduced by introducing a new concept of measurement cell. The samples of PAH components have been prepared with the standard constrictions of measured PAHs by using gas chromatograph (GC). OPO laser with tuning rang of (200 to 2400) nm and peak energy of 2.2 mJ were used to excite the tar compounds, which have fluorescence properties in the range of ultraviolet| blue spectral range. The measurements have been evaluated by incorporating the Excitation-Emission Matrices (EEM), presented as time consuming method for tar monitoring. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (329)
Crossref (295)
Scopus Clarivate Crossref
Publication Date
Tue Jun 19 2018
Journal Name
Elmofaker Review
The Secondary Liability of Electronic Auctions Arising from Contributory Trademark Infringement – A Comparative Study
...Show More Authors

Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit

... Show More
View Publication
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Human right rule in self-defense And its prohibitions in Islamic jurisprudence
...Show More Authors

God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of segment reporting requirements in enhancing the volume of segmental disclosure of the Iraqi corporations
...Show More Authors

The aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient  of Iraqi financial reporting requirements of segmental information affect<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 02 2026
Journal Name
Al-qadisiya Journal
معالجة النقص التشريعي بالاجتهاد القضائي المسؤولية التقصيرية الناشئة عن الذكاء الاصطناعي انموذجًا
...Show More Authors

View Publication
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
الاستقلال عن المجال الإدراكي والإتكال عليه وعلاقته بمستوى الطموح ومفهوم الذات الأكاديمي
...Show More Authors

The impedance from the cognitive field and reliance on it, ambition  level, and the academic ego concept are concepts on which too many varied studies had been conducted. The current research aims to the followings:

First:

Measuring the independence from the cognitive field and the reliance on it of the college students and this done for: the whole sample, the equalization among the degrees in accordance to the sex variable (male, female), specialty variable (scientific, humanistic).

Second:

Measuring the ambition level of the college students and this done for: the whole sample, the equalization among the degrees in accordance to the sex variable (male, female) and specialty variable (scientific, hum

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role of industry specialization of audit companies in detecting fraud in the financial statement
...Show More Authors

Abstract:

The aim of the research is to demonstrate the impact of the professional specialization of the audit companies in the detection of fraud in the financial statements of the economic units listed in the Iraqi market for securities for the period 2014-2015 through the application of the model (Carcello) to test the hypothesis of research on the impact of professional specialization of audit companies in the detection of fraud in lists The effect of the variables was revealed through the use of statistical models of logistic regression model and correlation coefficient. After testing the hypotheses of the research, a number of conclusions were reached. The most important was the existence of a signi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the

... Show More
View Publication Preview PDF