Preferred Language
Articles
/
hhfHc48BVTCNdQwCing7
Design and validation of an electronic data logging systems (CAN Bus) for monitoring machinery performance and management- Planting application
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The Chinese-Russian role towards the Iranian nuclear program)An analytical study of formation and development according to international variables and future prospects(
...Show More Authors

The Iranian nuclear program was one of the most prominent issues in the international arena, in light of Iran's insistence on using it in various ways, and according to international changes, it came under pressure from the American side to impose packages of sanctions, which continued to our time, as it went to Russia and China to gain support in developing its nuclear activities. And, by virtue of the common interests that are linked between them, Iran has received great support from the last two countries in all fields to reach the final agreement in 2015, regarding asserting the peace of these activities, in addition to lifting all restrictions represented in the previous sanctions according to the Security Council resolutions, Aldo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Schultz and Modified Schultz Polynomials for Edge – Identification Chain and Ring – for Square Graphs
...Show More Authors

In a connected graph , the distance function between each pair of two vertices from a set vertex  is the shortest distance between them and the vertex degree  denoted by  is the number of edges which are incident to the vertex  The Schultz and modified Schultz polynomials of  are have defined as:

 respectively, where the summations are taken over all unordered pairs of distinct vertices in  and  is the distance between  and  in  The general forms of Schultz and modified Schultz polynomials shall be found and indices of the edge – identification chain and ring – square graphs in the present work.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 02 2010
Journal Name
Advances In Software Engineering
A Strategy for Automatic Quality Signing and Verification Processes for Hardware and Software Testing
...Show More Authors

We propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test ca

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Topical Application of Flavanoids Extract of Hibiscus Sabdariffa on Experimentally Induced Bone Defect
...Show More Authors

Background: The restoration of bone continuity and bone union are complex processes, and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine The aim of this study: It was histological evaluation of effect of topical application of flavonoid on healing of induced bone defect in rabbit tibia. Material and method: Twenty-four Adult New Zealand rabbits used in this study, they were divided into four groups for the healing periods (3days, 1,2, and 4weeks) Two holes were induced in rabbit tibia one on the left side and has been left to heal normally as control. While, the other hole made on the right side filled with flavo

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effect of local exogenous application of osteopontin on wound healing in rats
...Show More Authors

Background: Wound healing is a complex dynamical interaction between various cell types, the extracellular matrix, cytokines, and growth factors. osteoponetin is a substance that acts as an anti-inflammatory. Aims of study: The study was designed to identify the role of local exogenous applications of osteopontin on wound healing (in cheek skin). Materials and methods: Thirty adult male albino rats weighting an average of (250-300gm) used in this study, incisional wounds were made in the skin of the cheek of rat and they were divided into the following groups: A-Control group: 15 rats treated with 1µ l of normal saline B-Experimental groups: 15 rats treated with topical application of 1µl osteopontin. The scarification of animals we

... Show More
View Publication
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use ofBang marking in the management of the cost of food and beverages in the hotel: sector (Case study in a sample of hotels in Baghdad governorate)
...Show More Authors

The competition in the hotel sector, globalization and the development of new information have forced the sector to continuously seek new techniques and arrangements to remain competitive through hotel industry companies, including Benchmarking and the application of this method in the hotel sector. The selection of the Rashid International Hotel by the Ministry of Tourism as a leading hotel or benchmark for comparison of other hotels in Iraq, and the selection of two hotels in Baghdad for comparison, namely (Ishtar International Hotel, Baghdad International Hotel) and the choice also by the Ministry of Tourism, N is to correct the course of practice to manage the cost and diagnosis of the weakness of the strengths and weaknesses in the

... Show More
View Publication
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF