Preferred Language
Articles
/
iheYZo4BVTCNdQwCGEYF
The effect of internal training and auditing of auditors on supply chain management: An empirical study in listed companies of Iraqi stock exchange for the period 2012-2015
...Show More Authors

Scopus
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (86)
Crossref (87)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 11 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health status among fifteen years-old students in Maysan governorate\Iraq
...Show More Authors

Background: Dental caries and periodontal disease are the most common and widely spread diseases affecting humans at different ages. Aim of this study is the assessment of prevalence and severity of dental caries, gingivitis, oral hygiene and enamel anomalies in relation to gender and residency among 15 years old students in Maysan governorate –Iraq. Materials and methods: The total sample composed of 750 students (400 males and 350 females, 450 urban and 300 rural) selected randomly from different high schools in the Governorate. Diagnoses and recording dental caries was according to the criteria of WHO (1987), Plaque index of Silness and Loe (1964) was used for plaque assessment, Ramfjord index (1959) was applied for the assessment

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 04 2013
Journal Name
1st Post – Graduate Students Conference, Alnahrain University / College Of Engineering
Convection Heat Transfer in Horizontal Annulus Porous Media with Rotating Outer Cylinder
...Show More Authors

A numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay

... Show More
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Pollution Bio- indicators In Al-Diwania River A1- (^a?lisia Province / Iraq
...Show More Authors

Benthic invertebrates were used as bio- indicators to evaluate the pollution in -Diwania River . Five stations were selected for this purpose , extending from A1 -?? rtream to A1- Sadeer District downstream . The percentage of?ct uP?str?^ ? ?, oligochaeta to total benthic invertebrates were calculated . The population density of evaluation. 'I'he results Were ??? Tubificid worms without hair ehaetae was ©iso used IOBS(01igochaete Index of Sediment Bioindicati©n ), TUSP ? presented as indices Io (Tubificidae Species Percentage ) & degree of pollution Eo . IT was noticed that the 0 in??37.17 percentage of ©lig©chaeta to the total benthic invertebrates ranged between to 60.685 in station 3 , while the percentage ©f Tubificid w©rms t© ©

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Optical Fiber Technology
A taper-in-etch based hybrid fiber Mach-Zehnder interferometer hydrogen sensor
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref