Preferred Language
Articles
/
chevWJABVTCNdQwCGIdq
SYNTHESIS OF ZNO QUANTUM DOT BY SELF ASSEMBLY METHOD AND ZNO NANOROD BY HYDROTHERMAL METHOD
...Show More Authors

In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of irrigation type and method on the cost of producing dunum of wheat crop
...Show More Authors

 

Abstract :  This research is concerned with studying the best type and method of  irrigation as well as the best cultivated area to reduce the cost of producing  dunums of wheat crop in Iraq , and was based on data taken from the Ministry of Planning / Central Statistical Organization About cost of wheat crop production for (12) Iraqi governorates except Kurdistan, Nineveh, Salah al-Din, Anbar) and the sample size (554) according to the cost survey carried out by the Ministry of Planning / Central Statistical Organization for 2017, The results of the research showed that there are significant statistical differences between production costs when using t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the method of partial least squares and the algorithm of singular values decomposion to estimate the parameters of the logistic regression model in the case of the problem of linear multiplicity by using the simulation
...Show More Authors

The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables.                                                        The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.    

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat May 17 2025
Journal Name
Iraqi Journal Of Science
Synthesis, Characterization and Quantum Mechanical Study of Some New 2-benzylidenehydrazinecarbothioamide Derivatives as Corrosion Inhibitors for Carbon/mild Steel in Acidic Medium.
...Show More Authors

In this work, some of new 2-benzylidenehydrazinecarbothioamide derivatives have been prepared by condensation of thiosemicarbazide and different substituted aromatic benzaldehydes in presence of glacial acetic acid to give compounds (1-6), these compounds have characterized by its physical properties and spectroscopic methods. This work also included theoretical study to prove the ability of these compounds as corrosion inhibitors; The program package of Gaussian 09W with its graphical user interface GaussView 5.0 had used for this purpose; the methods of Density Functional Theory (DFT) with basis set of 6-311G (d,p) / hybrid function of B3LYP and semiempirical method of PM3 have been used, the study included theoretical simulation

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
International Journal Of Engineering & Technology
Microwave Pyrolysis of Water hyacinth for Biochar Production Using Taguchi Method
...Show More Authors

The manuscript should contain an abstract. The abstract should be self-contained and citation-free and should not exceed 200 words. The abstract should state the purpose, approach, results and conclusions of the work.  The author should assume that the reader has some knowledge of the subject but has not read the paper. Thus, the abstract should be intelligible and complete in it-self (no numerical references); it should not cite figures, tables, or sections of the paper. The abstract should be written using third person instead of first perso The fast microwave assisted pyrolysis (FMWAP) of water hyacinth (WH) for biochar production is investigated. Taguchi’s method was used to optimize FMWAP parameters. The effects of microwave

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cost Management of construction industries according to the fast-track method
...Show More Authors

Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Methods And Objects Of Chemical Analysis
Partial Least Squares Method for the Multicomponent Analysis of Antibacterial Mixture
...Show More Authors

This study's objective is to assess how well UV spectrophotometry can be used in conjunction with multivariate calibration based on partial least squares (PLS) regression for concurrent quantitative analysis of antibacterial mixture (Levofloxacin (LIV), Metronidazole (MET), Rifampicin (RIF) and Sulfamethoxazole (SUL)) in their artificial mixtures and pharmaceutical formulations. The experimental calibration and validation matrixes were created using 42 and 39 samples, respectively. The concentration range taken into account was 0-17 μg/mL for all components. The calibration standards' absorbance measurements were made between 210 and 350 nm, with intervals of 0.2 nm. The associated parameters were examined in order to develop the optimal c

... Show More
Scopus (2)
Scopus Clarivate Crossref