Preferred Language
Articles
/
fYb_s4QBIXToZYALO0hd
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 01 2018
Journal Name
Optical Fiber Technology
Enhancing refractive index sensitivity using micro-tapered long-period fiber grating inscribed in biconical tapered fiber
...Show More Authors

View Publication
Scopus (16)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Chemical Methodologies
A Novel Design for Gas Sensor of Zinc Oxide Nanostructure Prepared by Hydrothermal Annealing Technique
...Show More Authors

Scopus (12)
Scopus
Publication Date
Fri Jul 15 2022
Journal Name
Bmc Health Services Research
Design and evaluation of a new mobile application to improve the management of minor ailments: a pilot study
...Show More Authors
Abstract<sec> <title>Background

Seeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.

Methods

The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Energy Conversion And Management
Improved PCM melting in a thermal energy storage system of double-pipe helical-coil tube
...Show More Authors

View Publication
Scopus (128)
Crossref (121)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Administrative Applications of Expert Systems in Educational Leadership Departments in the Light of the Systems Approach
...Show More Authors

Abstract

The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 24 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA: FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA
...Show More Authors

The extracted oil from the Chia seeds white and black were used in the manufacture of certain foods such as mayonnaise. The results of the sensory evaluation showed that the product was acceptable except for the flavor of white chia seed oil. The seeds were fully used in the manufacture of the nutella. The results of the sensory evaluation were encouraging the use of the extracted oil from the black chia seeds in the production of the nutella except the spread property. Chia seeds were also used in the manufacture of pudding. The results of the sensory evaluation showed an excellent and acceptable product of black chia seeds oil can be obtained, while the white seeds did not receive the acceptance in terms of color and flavor.

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 24 2022
Journal Name
Arab World English Journal
Conflict in Atwood’s The Handmaid’s Tale: A Critical Discourse Approach
...Show More Authors

Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s

... Show More
View Publication Preview PDF
Clarivate Crossref