Preferred Language
Articles
/
fBf97ZIBVTCNdQwCM8Nm
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Designing Educational Software Based on Web Quests and Its Effectiveness in Developing Information Search Skills among Students of the Department of Educational and Psychological Sciences
...Show More Authors

The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Chemical Engineering Science
Evaporation dynamics of microbubbles
...Show More Authors

View Publication
Scopus (56)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Multidisciplinary Engineering Science Studies (jmess)
Doping Ratio Of Silver Dependent On The Structure And Optical Properties Of Thin Cadmium Telluride Films
...Show More Authors

Publication Date
Fri Oct 14 2016
Journal Name
International Journal For Computational Methods In Engineering Science And Mechanics
Simultaneous determination of time-dependent coefficients and heat source
...Show More Authors

View Publication
Scopus (17)
Crossref (15)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF PREDATOR AND PARASITOID INSECTS IN DUHOK PROVINCE, KURDISTAN REGION, IRAQ
...Show More Authors

A total of 47 species belonging to 46 genera, 34 subfamilies, 23 families and 7 orders of predator and parasitoid insects were collected and identified. The survey was conducted throughout the program held by the General Directorate of Agriculture-Duhok, in cooperating with the College of Agricultural Engineering Sciences in Duhok Province, Kurdistan Region, Iraq from May 2013 to April 2014.
The species hosts, collecting date, locality and distributions are given. The current checklist also included some species previously collected by other researchers in Duhok Province.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Red flour beetle survival on different food items
...Show More Authors

Studied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....

View Publication Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
The Pleasure of Fear and the Temptation of the Thriller in Horror Cinema: كــاظــم مــؤنـــس عزيز
...Show More Authors

In the theory of cinema genre, horror films are at the forefront of the list. It is one of the oldest genres that saw the light with the early emergence of cinema, taking advantage of literary works, especially Gothic literature and it continues to this day, but the third millennium has seen a marked increase in the number of films and recipients alike. There were many types within the same genre and there are many authors and varied topics, all seeking to spread terror and panic and fear in the hearts of viewers who are passionate about the type of horror. Although the fear and horror have been, throughout the ages, a challenge to the psychological balance and stability, as well as being a rejection and an opposition to the aesthetic ta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal For Computers And Informatics
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

View Publication Preview PDF
Crossref