Preferred Language
Articles
/
joe-367
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Nov 10 2025
Journal Name
Al–bahith Al–a'alami
News Coverage in the Iraqi Electronic Press for Internal Crises: (An Analytical Study of Al-Zaman and Al-Sabah Electronic Newspapers for the period from 1/ 3/ 2013 to 31/ 3/ 2013)
...Show More Authors

 

The research study focused on the need to clarify the relationship between the Websites of Iraqi Newspapers and their roles in covering the internal crises in Iraq. The selection of Iraqi websites for the newspapers Al-Zaman and Al-Sabah was adopted as one of the most important media with a wide audience; and as a model of hot news and continuous coverage of those sites since 2003 so far. As a result, this necessitated the emergence of new types of methods of editing and writing news stories related to Iraq.

Consequently, the enormous and rapidly changing amount of Iraq news, the process of preparing and creating news has become a complex industry

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Diagnosis of factors affecting the strategic implementation of sewage projects ( Case study in General Directorate of sewage projects )
...Show More Authors

  This  Research aim to identify the factors affecting the strategic implementation of sewage projects and to seek to activate the real follow-up of projects to identify the factors that accompany their implementation, The study included a sample of the projects of the investment plan implemented for the Directorate General of sewage in the governorates of Iraq, which was completed during the six years period (2010-2016). The sample of the research was four projects: The project of implementation and processing of the treatment plant and the lifting station and the conveyor line for the project of IMARA/The third stage/Al-Sanaf marshland , The project of the processing and implementation of the treatment plant with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the level of performance according to the tax diagnosis TADAT: applied research in the General Tax Authority
...Show More Authors

The aim of the research is to indicate the degree of arrangement of the tax branches discussed and the level of efficiency of their performance according to the dimensions approved in the tax diagnostic tool (TADAT). The checklist has been approved as a main tool in collecting data and information from the tax branches of the General Authority for Taxes and the number (8) branches represented by (Karrada , Karakh Center, Al-Rusafa, New Baghdad, Al-Dora, Karakh Al-Tafim, Al-Kadhimiya, Al-Bayaa),  The statistical program (spss) was used to calculate the weighted arithmetic media, and we reached the research to a number of conclusions, the most important of which were: - Each of the subsections (Karkh Al-Ahram and Karrada) achieved an

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Influence of Cold Plasma on Sesame Paste and the Nano Sesame Paste Based on Co-occurrence Matrix
...Show More Authors

The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed.  The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Nov 10 2025
Journal Name
Journal Of Physical Education
Some Biomechanical Limitation During Acceleration Phase and Its Relationship With (110) m Hurdles Achievement for Advance Runners
...Show More Authors

View Publication
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Zn (II) and Cu (II) Ions Using PEG (300) - KCl Salt Aqueous Two-Phase Systems
...Show More Authors

In this paper the process of metal ions extraction (Zn(II) and Cu(II)) was studied in PEG-KCl aqueous two phase system was investigated without using an extracting agent. The experimental runs were performance at constant temperature (25 oC), constant mixing time (30 min), and constant PH of the solution (about 3). The effect of KCl salt concentration (from 10% to 25%), volumetric phase ratio of PEG solution to KCl solution (from 0.5 to 2), and the initial metal ion concentration (from 0.25 ml to 2 ml of 1 gm/L solution) were investigated on the percent extraction of Zn(II) and Cu(II). The results indicated that the percent extraction of metal ions increase with increasing of salt concentration and phase ratio, and slightly de

... Show More
View Publication Preview PDF