Preferred Language
Articles
/
f4b_s4QBIXToZYALfkiS
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting the Crowdsourcing in Activation Strategic Foresight for Leaderships Towards Managerial Reforming Strategies Selection A Suggested Study for Managerial Leadership
...Show More Authors

Abstract                                                                                                            

Environmental data (whether pre-emptive or responsive perspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 04 2016
Journal Name
International Journal Of Renewable Energy Development
The Temperature Profile for The Innovative Design of the Perforated Fin
...Show More Authors

The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Sentiment Analysis in Social Media using Machine Learning Techniques
...Show More Authors

Over the last period, social media achieved a widespread use worldwide where the statistics indicate that more than three billion people are on social media, leading to large quantities of data online. To analyze these large quantities of data, a special classification method known as sentiment analysis, is used. This paper presents a new sentiment analysis system based on machine learning techniques, which aims to create a process to extract the polarity from social media texts. By using machine learning techniques, sentiment analysis achieved a great success around the world. This paper investigates this topic and proposes a sentiment analysis system built on Bayesian Rough Decision Tree (BRDT) algorithm. The experimental results show

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Characterization and Bioactivity Study of Few Metal Complexes of Curcumin with 2-(1H-Benzimidazol-2-yl) Aniline
...Show More Authors

We have synthesized many metal (II) complexes using curcumin L1 as the major ligand and 2-(1H-Benzimidazol-2-yl) aniline L2 as a supporting ligand. The complexes were characterized by spectroscopy methods such as; molar conductivity, elements microanalysis, Fourier-transform spectroscopy (FT-IR), UV-vis, and mass spectroscopy. Both curcumin ligands and L2 were found to be capable of binding to M(II) and metal ions via their two N atoms, according to the data. The formula for the complexes is the same. [M (L1)(L2)H2OCl], where M is Ni(II), Co(II), Cu(II), Cd(II), and Hg(II) (II). Octahedral complexes are proposed for the prepared compounds. The bio-actives suggested that the complexes are effective against bacteria and fungus on a mi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al-qadisiyah Journal Of Pure Science
Synthesis and Spectroscopic Studies of Some Metal Complexes of [3-(3-(2-chloroacetyl)thioureido)pyrazine-2-carboxylic acid]
...Show More Authors

A new ligand [3(3(2chloroacetyl) thioureido)pyrazine-2-carboxyliIcacid](CPC)was synthesized by reaction of rized by imicro elmental analysis C.H.N.S.,FT-IR,UV-Vis and 1H-13CNMR spectra, some transition metals complex ofIthis ligand were Prepared and characterized byiFT-IR,UV-Vis spectra conductivity measurements magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were[M(CPC)2](M+2i=Mn. Co, Ni, Cu, Zn, Cd and Hg),the proposedi geometrical structure for all complexes were as tetrahedral geometry except copper complex has square planer geometry.

Publication Date
Fri Sep 01 2023
Journal Name
Asian Pacific Journal Of Cancer Prevention
Development of a T-ARMS-PCR Assay for Detecting Genetic Polymorphism in the Catalase (rs7943316) Gene in the Iraqi Population with Breast Cancer
...Show More Authors

View Publication
Scopus Crossref