Preferred Language
Articles
/
jcoeduw-30
Time paradox in the Iraqi feminist novel (2003 – 2013)
...Show More Authors

This paper deals with novels for group of Iraqi Women novelists published in the time period 2003 – 2013, and the functioning of temporal anomalies in the Iraqi Women's narrative.
In general, the novel contains structural elements such as: the characters, events and the places, these elements must be collected by an artist creating a complete work of fiction. However the time dominates the other elements through progression and regaining called Time paradox, it has a modern critical importance because of its impact in highlighting of political, social and cultural events that make up the fictional environment which cast a shadow over other techniques. And that it is clear in the course of the narrative.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Thu Aug 11 2022
Journal Name
Arabian Journal For Science And Engineering
Synthesis and Characterization of Novel Nano Azo Compounds as a New pH Sensor
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 15 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Novel Candidate Single Nucleotide Polymorphisms of ERCC2 Gene that Influence Colorectal Cancer Susceptibility
...Show More Authors

Colorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t

... Show More
Preview PDF
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 01 2026
Journal Name
South African Journal Of Chemical Engineering
Photoelectrocatalytic degradation of tetracycline by a novel Gr /Ni-Sb-SnO2 photo-anode
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
مجلة العلوم الاحصائية
نمذجة السلاسل الزمنية التي تنتجها اجهزة الاحصاء الدولية وانتاج قيم تنبؤية لمتخذ القرار حالة دراسية : التنبؤ بالمساحة المزروعة لمحصول الذرة الصفراء في العراق للفترة (2015-2020
...Show More Authors

تنفذ أجهزة اإلحصاء الدولية ومنها الجهاز المركزي لإلحصاء في العراقإحدى أجهزة وزارة التخطيط، تقوم بإجراء مسوح سنوية ودورية لإنتاج مؤشرات تقييم وتقويم أنشطة القطاعات الاقتصادية المختلفة. يتيح هذا الكم الهائل من البيانات بشكل سلسل زمني لهذه الأجهزة إنتاج مؤشرات جديدة، بما في ذلك القيم التنبؤية لمؤشرات رئيسية تستخدم في إعداد الخطط طويلة وقصيرة المدى. في عام 2015، قامت مديرية الإحصاء الزراعي في الجهاز المركزي للإ

... Show More
Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Novel Coronavirus Pandemic as it is Expressed by Children in Their Drawings On-line: An Analytical Study: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su

... Show More
View Publication Preview PDF
Crossref