Preferred Language
Articles
/
cRYJAIoBVTCNdQwCpY8s
Effect of seed weight on stem anatomical characters in white lupine (Lupinus albus L.) cultivars
...Show More Authors

An anatomical study was carried out at the College of Agricultural Engineering Sciences, University of Baghdad, in 2017, on lupine crop (Lupinus albus) as a comparison guide of three seed weights of three lupine cultivars viz. ‘Giza-1’, ‘Giza-2’ and ‘Hamburg’. The nested design was used with four replications. The results showed that cultivars had a significant effect on stem anatomical traits. ‘Hamburg’ cultivar recorded the highest stem diameter, cortex thickness and xylem vascular diameter, while cultivar ‘Giza-1’ recorded the lowest values for the same traits as well as the highest collenchyma layer thickness, vascular bundle thickness, and xylem thickness. Cultivar ‘Giza-2’ recorded the lowest vascular bundle thickness and xylem thickness. The interaction between cultivar and seed weight was significant. ‘Hamburg’ cultivar was superior to both ‘Giza-1’ and ‘Giza-2’ anatomically. ‘Hamburg’ cultivar with lower seed weight was found best for field sowing to get higher yield with lower seed cost.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Strategic leadership according to the outstanding banking performance analystical study on private banks
...Show More Authors

This research aimd to analyze the role of strategic entreprenenial on according to the external performance of a sample of Iraqi private banks, namely, (National Islamic Bank, Iraqi Ahli Bank, Baghdad Bank , Middle East Iraqi Investment Bank) has launched research in fundamental problem stems from the question seeking his response to the characterization of the problem which is improve banking performance through strategic entreprenenial and to achieve the goal of the research was to prepare a questionnaire included a number of questions about the independent research and approved variables accounting for the independent variable strategic entreprenenial and included four dimensions (entreprenenial culture), entreprenenial leader

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Determination of some heavy Metals in tattoo Stickers in Children sweets available in local markets: Determination of some heavy Metals in tattoo Stickers in Children sweets available in local markets
...Show More Authors

The objective of this study is to determination the content of some heavy metals (lead, cadmium, chromium) in colored tattoo stickers. twelve kinds of colored tattoo stikcers were collected from Baghdad markets, it was estimated heavy metals using atomic absorption spectrophotometer (Shimadzu A5000). The results indicated the concentrations of lead in all samples (1.61_1.00 mg / kg) and chromium in the three samples (0.85_0.97 mg / kg) while other samples are free of chromium , and cadmium. These elements are the components of printing inks and dyes in tattoo stickers, and this does not conform to the health and safety conditions for the packaging of food according to the organizations of the health and safety of

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 16 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Reflexive Learning Strategy On Mathematics Achievement By First Intermediate Class Students And Their Attitudes Towards E-Learning
...Show More Authors

Publication Date
Wed Mar 01 2023
Journal Name
Chalcogenide Letters
Preparation and analysis of Ag2Se1-xTe x thin film structure on the physical properties at various temperatures by thermal evaporation
...Show More Authors

Silver selenide telluride Semiconducting (Ag2Se0.8Te0.2) thin films were by thermal evaporation at RT with thickness350 nm at annealing temperatures (300, 348, 398, and 448) °K for 1 hour on glass substrates .using X-ray diffraction, the structural characteristics were calculated as a function of annealing temperatures with no preferential orientation along any plane. Atomic force microscopy (AFM) and X-ray techniques are used to analyze the Ag2SeTe thin films' physical makeup and properties. AFM techniques were used to analyze the surface morphology of the Ag2SeTe films, and the results showed that the values for average diameter, surface roughness, and grain size mutation increased with annealing temperature (116.36-171.02) nm The transm

... Show More
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
The Jurisprudence rule and its impact on Islamic legislation “Forcing does not nullify the rights of others” as a model .
...Show More Authors

Research Summary :

         Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 24 2025
Journal Name
Advances In Structural Engineering
Experimental and numerical investigation on the behavior of composite reinforced concrete columns encased by steel section and hybrid GFRP section
...Show More Authors

GFRP was employed in constructions as an alternative to steel, which has many advantages like lightweight, large tensile strength and resist corrosion. Existing researches are insufficient in studying the influence of hybrid reinforced concrete composite columns encased by GFRP I-section (RCCCEG) and I-section steel (RCCCES). In this study twenty one (RC) specimens of a cross-section of 130 mm × 160 mm, with different length (long 1600 mm and short 750 mm) were encased by using I-section (steel and GFRP) and tested under various loading (concentric, eccentric and flexural loads). The test was focused on the influence of many parameters; load-carrying capacity, mode of failure, deformation and drawing an interaction diagram (N-

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
A Comparative Investigation of Different Ionospheric Models to Predict the MUF Parameter During Severe Geomagnetic Storm on 17th March 2015.
...Show More Authors

The present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co

... Show More
View Publication Preview PDF
Scopus Crossref