Preferred Language
Articles
/
jperc-281
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Theoretical Study and calculation The cold Reaction Rate of Deuteron Fusion In Nickel Metal Using Bose–Einstein Condensate Theory
...Show More Authors

In this paper, we focused on the investigated and studied the cold fusion reaction rate for D-D using the theory of Bose-Einstein condensation and depending on the quantum mechanics consideration. The quantum theory was based on the concept of single conventional of deuterons in Nickel-metal due to Bose-Einstein condensation, it has supplied a consistent description and explained of the experimental data. The analysis theory model has capable of explaining the physical behaviour of deuteron induced nuclear reactions in Nickel metals upon the five-star matter, it's the most expected for a quantitative predicted of the physical theory. Based on the Bose-Einstein condensation theorem formulation, we calculation the cold fusion reaction rate fo

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Theoretical study of matter density distribution and elastic electron scattering form factors for the neutron-rich 22C exotic nucleus
...Show More Authors

The ground state proton, neutron, and matter density distributions and corresponding root-mean-square radii (rms) of the unstable neutron-rich
22C exotic nucleus are investigated by two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO)
potential are used with two oscillator parameters bcore and bhalo. According to this model, the core nucleons of 20C are assumed to move in the model
space of spsdpf. Shell model calculations are performed with (0+2)hw truncations using Warburton-Brown psd-shell (WBP) interaction. The outer (halo) two neutrons in 22C are assumed to move in HASP (H. Hasper) model space (2s1/2, 1d3/2, 2p3/2, and 1f7/2 orbits) using the HASP interaction. The halo st

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculations of the Electron Transport Parameters in CH4-Ar and CH4-Ne Mixtures Gases Using Monte Carlo Method
...Show More Authors

    The result of concentration varying of mixture methane with argon and neon gas are believed to study the change in electrons energy distribution function and then the change of the electrons transport parameters including the drift velocity, the mean energy, characteristics energy and diffusion coefficient. In the present work,a contemporary developed computer, simulation program known as Bolsig+ is being used for calculating the electron transport parameters.
 

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Towards building an educational system free of scientific corruption (Applied study in a sample of colleges of higher education in Iraq within the framework of the government program and the directions of the Supreme Council for Combating Corruption)
...Show More Authors

Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Al-Hajjaj in pre-Islamic poetry hangs Imru 'al-Qays and the Twrfa of Ibn al-Abd as a model
...Show More Authors

The topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.

View Publication Preview PDF
Publication Date
Mon Oct 15 2018
Journal Name
Arab Science Heritage Journal
نحو نظام نحو نظام لغوي عربي متوازن في المساواة بين الرجل والمرأة
...Show More Authors

We must live in an era dominated by the call for equality between men and women, in which the voices of advocates of gender integration were heard. After women opened their doors to compete with their brother, Knowledge, and culture in the various forms of life, language as a science of the time and knowledge of the other had to match this reality and express the most accurate expression of this task

View Publication Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Practices Toward Infection Control Standardized Precautions in Azady Teaching Hospital in the City of Kirkuk
...Show More Authors

Objective: The aim of the present study is to assess the practices of nurses towards standard precautions at Azady
Teaching Hospital in the City of Kirkuk.
Methodology: A descriptive study, which uses the assessment approach and it was conducted on nurses from January
18th, 2009 to September 30th, 2009, using non-probability sampling a purposive sample of (37) subject (male and
female nurses) who worked at surgical wards in Azady Teaching Hospital in Kirkuk city was selected. Two study
instruments were utilized for proper data collection [questionnaire and observational checklist]; a questionnaire was
developed for the purpose of the study. It was comprised of two parts which included the nurses' demographic
characte

... Show More
View Publication Preview PDF