Preferred Language
Articles
/
jcois-495
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Evaluation of Hemolysis Activity of Zerumbone on RBCs and Brine Shrimp Toxicity
...Show More Authors

Zerumbone is a well-known compound having anti-cancer, anti-ulcer, anti-inflammatory and anti-hyperglycemic effects. During its use for the disease treatment, the membrane of erythrocyte can be affected by consumption of this bioactive compound. The current study was the first report of investigation of the hemolytic activities on human erythrocytes and cytotoxic profile of zerumbone. The toxicity of zerumbone on human erythrocytes was determined by in vitro hemolytic assay. Brine shrimp lethality assay was used to evaluate the cytotoxic effect of zerumbone at concentrations 10, 100 and 1000 μg/mL. The human erythrocyte test showed no significant toxicity at low concentrations, whereas hemolytic effect was amplified up to 17.5

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA
...Show More Authors

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces
...Show More Authors

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Effect of Temperature on Reliability and Degradation of 0.63?m Laser Diode
...Show More Authors

The reliability of optical sources is strongly dependent on the degradation and device characteristics are critically dependent on temperature. The degradation behaviours and reliability test results for the laser diode device (Sony-DL3148-025) will be presented .These devices are usually highly reliable. The degradation behaviour was exhibited in several aging tests, and device lifetimes were then estimated. The temperature dependence of 0.63?m lasers was studied. An aging test with constant light power operation of 5mW was carried out at 10, 25, 50 and 70°C for 100hours. Lifetimes of the optical sources have greatly improved, and these optical sources can be applied to various types of transmission systems. Within this degradation range,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Effect of Excitation Energy and Mass number on Most probable exciton number
...Show More Authors

Exciton model describes the excitation of particles in pre-equilibrium region of nuclear reaction by exciton. In pre-equilibrium region there is a small probability for occurring emission and the number of excitons be the probability of the emission of it possible more is called most probable exciton number MPEN. In this paper the MPEN formula was derived for protons and neutrons separately and so MPEN formula derived with taking into account the non equidistant spacing between the energy states. The MPEN was studied with the mass number where it is noticed the MPEN increases with increasing the mass number. Also, MPEN studied for different isotopes of Al, the MPEN increases with increasing mass number of isotopes. MPEN for neutron is co

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Parallel Clustering Analysis Based on Hadoop Multi-Node and Apache Mahout
...Show More Authors

     The conventional procedures of clustering algorithms are incapable of overcoming the difficulty of managing and analyzing the rapid growth of generated data from different sources. Using the concept of parallel clustering is one of the robust solutions to this problem. Apache Hadoop architecture is one of the assortment ecosystems that provide the capability to store and process the data in a distributed and parallel fashion. In this paper, a parallel model is designed to process the k-means clustering algorithm in the Apache Hadoop ecosystem by connecting three nodes, one is for server (name) nodes and the other two are for clients (data) nodes. The aim is to speed up the time of managing the massive sc

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Diagnosis and Classification of Type II Diabetes based on Multilayer Neural Network
...Show More Authors

     Diabetes is considered by the World Health Organization (WHO) as a main health problem globally. In recent years, the incidence of Type II diabetes mellitus was increased significantly due to metabolic disorders caused by malfunction in insulin secretion. It might result in various diseases, such as kidney failure, stroke, heart attacks, nerve damage, and damage in eye retina. Therefore, early diagnosis and classification of Type II diabetes is significant to help physician assessments.

The proposed model is based on Multilayer Neural Network using a dataset of Iraqi diabetes patients obtained from the Specialized Center for Endocrine Glands and Diabetes Diseases. The investigation includes 282 samples, o

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Pharmacology & Pharmacy
Gift Acceptance and Its Effect on Prescribing Behavior among Iraqi Specialist Physicians
...Show More Authors

View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref