Preferred Language
Articles
/
eBbfCocBVTCNdQwCSzIr
A strategy for Grid based t-way test data generation
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Free Head Shear Test on Decomposed Granite Soil
...Show More Authors

The study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Teaching Strategy Based on the Cognitive Model of Daniel in the Development of Achievement and the Motivation of learning the School Mathematics among the Third Intermediate Grade Students
...Show More Authors

This research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Fri Mar 15 2019
Journal Name
Alustath Journal For Human And Social Sciences
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the proposed strategy of Maysan Oil Company for the years 2020-2024
...Show More Authors

ناقش البحث في طياته عدداً من القضايا الرئيسة المتعلقة بالتقييم الاستراتيجي والإطار العام للخطة الاستراتيجية المقترحة لشركة نفط ميسان للسنوات الخمس المقبلة (2020_2024)، وهدف هذا البحث يتمحور في تقييم عملية صياغة استراتيجية شركة نفط ميسان لتحديد نقاط القوة وتعضيدها ومواطن الضعف ومحاولة معالجتها لتجنب الوقوع بها عند وضع استراتيجية للسنوات القادمة، وعلى هذا الاساس فان مشكلة البحث تكمن في مدى نجاح الاستراتي

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Modeling strategy in the subject of recitation provisions for students of Islamic sciences colleges
...Show More Authors

on the subject of the provisions of recitation among students of the Islamic Sciences Colleges).

The researchers adopted the experimental method and chose an experimental design for the two equivalent groups by post-test. The research sample consisted of (60) male and female students from (second stage) - Department of Qur’an Sciences and Islamic Education - University of Diyala, and the two researchers were rewarded between the two groups of research in the following variables: (Chronological age calculated in months, degrees of recitation rulings subject in the previous year, the two researchers studied the same research groups, and lasted for an entire semester, the researchers prepared the observation card to measure the ru

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of green strategy formulation in green behavior for municipal corporations – Analytical study
...Show More Authors

The research shows the importance of orientation towards the formulation of the green strategy and its effect in determining the behavior of the green municipal institution in Babel governorate. The research highlighted the formulation of the green strategy as an important variable, especially today, the trend towards protecting the environment and minimizing the damage resulting from the delivery of services, and through it also the type of green behavior or performance adopted by the municipal institution and the emergence of the need for a strategy that is not harmful to the environment. The research took the sample intentionally comprehensive size of 222 personnel of municipal institutions and some formations concerned with t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref