Preferred Language
Articles
/
jcopolicy-175
Depleted Uranium And use an American in Iraq
...Show More Authors

اليورانيوم المنضب واستخدامه امريكياً في العراق

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
مجلة ميسان للدراسات الأكاديمية
An Overview Of The Loquat's "Eriobotrya Japonica" Active Components
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Alustath Journal For Human And Social Sciences
An evaluation study of Islamic websites on the Internet
...Show More Authors

The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla

... Show More
Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Leverage: An Empirical Research
...Show More Authors

The research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
AWSS: An Algorithm for Measuring Arabic Word Semantic Similarity
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation of Azithromycin Suspension as an Oral Dosage Form
...Show More Authors

Azithromycin is the drug of choice in the treatment of several bacterial infections, most often those causing middle ear infection, bronchitis, pneumonia, typhoid and sinusitis. It’s also effective against certain urinary tract infections and venereal diseases. This study was carried out to prepare an acceptable suspension either as dry physical mixture powder or granules to be reconstituted, through studying the effect of various type and concentration of suspending agent (xanthan gum, hydroxypropyl methylcellulose (HPMC), either alone or in combination) on the release profile of the drug. The best prepared suspension formulas (H& III) were selected depending on the dissolution profile of each formulas and then compared with

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Lease: An Empirical Study
...Show More Authors

The Purpose of this study are  analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial  lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 21 2020
Journal Name
University Of Thi-qar Journal Of Science (university Of Thi-qar Journal Of Science (utsci) The 4th Scientific Conference Of Science College/ University Of Thi_qari) The 4th Scientific Conference Of Science College/ University Of Thi_qar
Enhancement of Nano Catalyst for an Alkaline Fuel Cells
...Show More Authors

Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Facial Expression Recognition Based on Deep Learning: An Overview
...Show More Authors

      Recognizing facial expressions and emotions is a basic skill that is learned at an early age and it is important for human social interaction. Facial expressions are one of the most powerful natural and immediate means that humans use to express their feelings and intentions. Therefore, automatic emotion recognition based on facial expressions become an interesting area in research, which had been introduced and applied in many areas such as security, safety health, and human machine interface (HMI). Facial expression recognition transition from controlled environmental conditions and their improvement and succession of recent deep learning approaches from different areas made facial expression representation mostly based on u

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref