Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Studying the Flux Density of Bright Active Galaxies at Different Spectral Bands
...Show More Authors

Statistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied ,  with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been found that t

... Show More
Scopus (14)
Scopus Clarivate Crossref
Publication Date
Fri Sep 29 2023
Journal Name
International Journal Of Applied Mechanics And Engineering
Fuzzy logic control of active suspension system equipped with a hydraulic actuator
...Show More Authors

In this paper, the Active Suspension System (ASS) of road vehicles was investigated. In addition to the conventional stiffness and damper, the proposed ASS includes a fuzzy controller, a hydraulic actuator, and an LVDT position sensor. Furthermore, this paper presents a nonlinear model describing the operation of the hydraulic actuator as a part of the suspension system. Additionally, the detailed steps of the fuzzy controller design for such a system are introduced. A MATLAB/Simulink model was constructed to study the proposed ASS at different profiles of road irregularities. The results have shown that the proposed ASS has superior performance compared to the conventional Passive Suspension System (PSS), where the body displacemen

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Data Base for Dynamic Soil Properties of Seismic Active Zones in Iraq
...Show More Authors

Iraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Studying the Flux Density of Bright Active Galaxies at Different Spectral Bands
...Show More Authors

Statistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied ,  with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been found that t

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Studying the Flux Density of Bright Active Galaxies at Different Spectral Bands
...Show More Authors

Statistical studies are reported in this article for an active galactic nuclei sample of different type of active galaxies Seyferts 1, Seyferts 2, and Quasars. These sources have been selected from a Catalogue for bright X-ray galaxies. The name of this index is ROSAT Bright Source Catalogue (RBSC) and the NRAO VLA Sky Survey (NVSS). In this research, multi-wavelength observational bands Radio at 1.4 GHz, Optical at 4400 A0, and X-ray at energy 0.1-2.4 KeV have been adopted in this study. The behavior of flux density ratios has been studied ,  with respect to the absolute magnitude . Furthermore, the Seyfert1 and Seyfert 2 objects are combined in one group and the QSOs are collectest in another group. Also, it has been fo

... Show More
View Publication Preview PDF
Scopus (14)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Our Dermatology Online
Treatment of active acne vulgaris by chemical peeling using 88% lactic acid
...Show More Authors

KE Sharquie, AA Noaimi, EA Al-Janabi, Our Dermatology Online, 2014 - Cited by 11

View Publication
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The evaluation of the procedures of excution the national strategy of unti - corruption in Iraq (2014-2010)
...Show More Authors

    Corruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life,  whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.

This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More