Preferred Language
Articles
/
jcofarts-1048
Evaluation of user interface designs in official websites "Fine Art Colleges Model"
...Show More Authors

I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter includes the analysis of models and the separation The fourth contains the results and conclusions.
1. The reliability and ease of searching within destination spaces should be emphasized.
2. Providing freedom of opinion in opinion via social media links.
3. Freedom to use in terms of language selection and settings control icon.
4. Take into account the organization and distribution in the interface spaces and use the space distribution correctly

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed

... Show More
Crossref (7)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (119)
Crossref (98)
Scopus Clarivate Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Synthesis, Identification and evaluation of antibacterial activity of some new substituted N-benzyl-5-Bromo Isatin
...Show More Authors

This research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide)

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Sep 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Characterization and Evaluation of Antimicrobial Activity of Few New Heterocyclic Compounds Derived from Nicotinic Acid
...Show More Authors

New schiff bases series (VIII) a-e and 1,3-thiazolidin-4-one derivatives (IX) a-e containing the 1,2,4-triazole and 1,3,4-thiazazole rings were synthesized and screening their biological activities. These compounds were identified via Fourier transform infrared (FT-IR) spectra, some via Proton nuclear magnetic resonance (1H-NMR) and mass spectra. The biological results indicated that all of these compounds did not reveal antibacterial effectiveness against (Escherichia coli and Klebsiella species) (G-). Some of these compounds showed moderate antibacterial activity against (Staphylococcus aureus, and Staphylococcus epidermidis) (G+), and all compounds exhibited moderate activity against Candida albicans.

Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Jan 06 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization And Biological Evaluation of Schiff Base And Ligand Metal Complexes of Some Drug Substances
...Show More Authors

Synthesis, Characterization And Biological Evaluation of Schiff Base And Ligand Metal Complexes of Some Drug Substances

Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Study the Quality of Nasopharyngeal plans Using Evaluation Indexes of IMRT and VMAT Treatment planning Techniques
...Show More Authors

Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 15 2022
Journal Name
Sustainability
Evaluation of Physio-Chemical Characteristics of Bio Fertilizer Produced from Organic Solid Waste Using Composting Bins
...Show More Authors

Background: The possibility of converting the organic fraction of municipal solid waste to mature compost using the composting bin method was studied. Nine distinct treatments were created by combining municipal solid waste (MSW) with animal waste (3:1, 2:1), poultry manure (3:1, 2:1), mixed waste (2:1:1), agricultural waste (dry leaves), biocont (Trichoderm hazarium), and humic acid. Weekly monitoring of temperature, pH, EC, organic matter (OM percent), and the C/N ratio was performed, and macronutrients (N, P, K) were measured. Trace elements, including heavy metals (Cd and Pb), were tested in the first and final weeks of maturity. Results: Temperatures in the first days of composting reached the thermophilic phase in MSW compost

... Show More
View Publication
Scopus (20)
Crossref (14)
Scopus Clarivate Crossref