Preferred Language
Articles
/
ijs-4451
On Fixed Point Theorems by Using Rational Expressions in Partially Ordered Metric Space
...Show More Authors

The main purpose of this paper is to introduce and prove some fixed point theorems for two maps that

satisfy -contractive conditions with rational expression in partially ordered metric spaces, our results improve and unify a multitude of fixed point theorems and generalize some recent results in ordered partially metric space.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Study the Effect of Various Parameters on the Synthesis of ZSM-5 Zeolite
...Show More Authors

ZSM-5 zeolite was synthesis under hydrothermal conditions at 175oC. The synthesis parameters have been investigated to find optimum synthesis method. Firstly, the crystallization time has been investigated to find the optimum crystallization time. Also, the ageing time was studied. The morphology, structure, and composition of the synthesized ZSM-5 zeolite were characterized using scanning electron microscopy (SEM), pH meter, viscometer, and X-ray powder diffraction (XRD). The bulk Si/Al ratio of ZSM-5 zeolite was in the range of 9.5—11.7. The synthesized ZSM-5 zeolite with appropriate ageing time could adjust crystal size and degree of the crystallinity. The crystal size of ZSM-5 zeolite obtained at an agei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Role of Italian Occupation of Ethiopia On the Egyptian- Italian Relations 1935
...Show More Authors

When the Italian fascist party leaded & access to the top of regime, it took Benito
Mussolini as a post of Italian prime minister on 1922, that lead to rise the voices which need
to find colonies of Italy, like other colonial countries, especially that of its colonies in Libya,
Eritrea and Somalia were not achieved its ambitions, was to be the occupation of Ethiopia to
revive her dreams to exert control over the Red sea and the Mediterranean and the
establishment of a vast empire satisfy colonial ambitions.
the Italian invasion of Ethiopia gained particularly important, what led to the
disruption of the balance of political forces is not at the level of local powers in the region,
but at the level of the exten

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
The Influence of CeO2 Concentration on Some Physical Properties of Y2O3 Thin Films
...Show More Authors

       Thin films of pure yttrium oxide (Y2O3) and doped with cerium oxide (CeO2) were prepared by the chemical spray pyrolysis(CSP)method. The structural, optical and electrical properties of the prepared films were investigated. The analysis of X-ray diffraction (XRD) thin films revealed that the undoped and doped Y2O3  were amorphous with a broad hump around 27o and narrow humps around 48o and 62o for all samples. Except for the Y2O3:6wt.%CeO2 thin film, all had signal preferential orientation along the (100) plane at 2θ=12.71o which belongs to CeO2, Field emission scanning electron mic

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Study the effect of sodium hydroxide solution on the thermal conductivity of nanocomposites
...Show More Authors

In this research, hand lay- up technique is used to prepare samples from epoxy resin reinforced with multi- walled carbon nanotubes in different weight fractions (0, 2, 3, 4, 5) wt%. The immersion effect by sodium hydroxide solution (NaOH) at normality (0.3N) for a period of (15 days) on the thermal conductivity of nanocomposites was studied, and compared to natural condition (before immersion). The thermal conductivity of epoxy nanocomposites specimens were carried out using Lee’s disk method. The experimental results showed that thermal conductivity increased with increase weight fraction before and after immersion for all specimens, while the immersion effect leads to decrease thermal conductive values compared to thermal conductivi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Experimental Study on the Behaviours of Post-tensioned Concrete Members with Unbonded Tendons
...Show More Authors
Abstract<p>This paper presents experimental results regarding the behaviours of eight simply supported partially prestressed concrete beams with internally unbonded tendons, focusing particularly on the effect of three different variables: concrete compressive strength, <italic>f<sub>c</sub> </italic>′; jacking stress, <italic>f<sub>j</sub> </italic>; and the prestressing index, ω. Increasing the concrete compressive strength from 35 MPa to 60 MPa was seen to lead to an increase in load-carrying capacity by about 10%. The load capacity was also affected, though to a lesser extent, by the jacking stress. The failure lo</p> ... Show More
View Publication
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Derivation of Crystal Orientation Matrix for Triclinic System on Two-circle Diffractometer
...Show More Authors

 The limited availability of the two-circle diffractometer to collect intensity measurements down to the monoclinic system has been extended in a novel procedure to collect intensities for the triclinic system. The procedure involves the derivation of matrix elements from graphical representation of the reciprocal lattice. Offset of  the origins of  the upper layers from that of the zero-layer - characteristic of triclinic system - is determined and the  3 x 3  matrix elements are evaluated accordingly. Details of  crystal alignment by X-rays for the triclinic system utilizing the intensities of  equivalent reflections is described

View Publication Preview PDF