Preferred Language
Articles
/
fBf97ZIBVTCNdQwCM8Nm
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Blockchain Technology and its Potential Effect on the Banking Industry (China Case Study)
...Show More Authors

The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Iraq public exposuring to foreign satellites and its effect on the cultural identity
...Show More Authors

The summary of this study is to identify the relation ship between exposuing of the
public to foreign satellites and the degree of cultural of Iraqi public . the danger Iraqi public
exposure to foreign satellite specially some groups of the public are still own limited culture
and ideology without enough conscious to attitude of society . such people cun easily be
controlled by satellites , because these satellites may be the only cultural source for them
which may badly affect their behaviour . This study also aims to identify the level of Iraqi
people exposure to foreign satellites and the types and motivations of that exposure , then to
realize the relationship between exposing to foreign satellites and the cultur

... Show More
View Publication Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (19)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Imam Yahya bin Saeed Al-Ansari and his jurisprudential views on fasting issues
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

 

The reason for choosing this topic was:

 

First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.

 


Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).

 


Third: The study of the jurisprudence of the companions

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Ecological and Geographical distribution of species and genera of Primulaceae in Iraq
...Show More Authors

The present research deal with ecological and geographical distribution of species and genera of Primulaceae in Iraq. The results were revealed that species distributed in the north , north-east and west of Iraq. Anagallis arvensis L. is the most prevalent species tolerant to different environmental conditions, while the species of Primula L. characterized as less widespread and limited in one District. In addition, the districts Rawanduz (MRO) and Sulaymaniyah (MSU) have ranked first in distribution of the species on geographical districts with (75%), while the districts southern desert (DSD) and Basra (LBA) in last place with (16.7%). Maps for geographical distribution for all species were illustrated.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Effect of aqueous and alcoholic extracts of Mushroom Calvatia craniiformis in bone marrow and interferon Gamma in mice
...Show More Authors

This research was designed to study the effect of water and alcoholic crude extracts of Calvatia craniiformis in vitro and in vivo On the other hand this study tested the toxic effect of both extracts in normal laboratory mice. The results showed that water and alcoholic extracts relatively have an acute toxic effect in mice in respect to LD50 (85 mg/kg, and 177mg/kg respectively). However the chronic toxicity of water extract at three different concentration (50, 75, 100 mg/kg) and alcoholic extract at concentrations of (100, 150, 200 mg/kg) was investigated in normal mice by (I.P) administration for 30 days alternatively and one drag in 48 hours . The results indicated significant effect (P ? 0.01) increasing in (MI) and (BI) of bone mar

... Show More
View Publication Preview PDF
Crossref