Preferred Language
Articles
/
jperc-525
The Effect of a Behavioral-Cognitive Training Program on Problems Solving among college students in the faculty of education for women : Baghdad University
...Show More Authors

The purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university  College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Kufa Journal Of Engineering
Numerical Analysis for the Response of Skirt Circular Shallow Footing Resting on Sandy Soil under vertical loads
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Apr 01 2009
Journal Name
International Journal Of Applied Environmental Sciences
An expert System for Predicting the Effects of Noise Pollution on Grass Trimming Task Using Fuzzy Modeling
...Show More Authors

Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
The Role of Water Absorption on Thermal Conductivity and Mechanical Properties for (Recycling HDPE-Coal Ash) Composite
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of Internal Medicine
On the use of substandard medicines in hematology: An emerging concern in the Middle East and North Africa region
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Oncology And Radiotherapy
The role of breath holding technique on minimizing cardiac dose in left breast cancer irradiation in the adjuvant setting
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Estimation the annual dose for residents in the area around the berms of Al-Tuwaitha nuclear site using RESRAD software
...Show More Authors

RESRAD is a computer model designed to estimate risks and radiation doses from residual radioactive materials in soil. Thirty seven soil samples were collected from the area around the berms of Al-Tuwaitha site and two samples as background taken from an area about 3 km north of the site. The samples were measured by gamma-ray spectrometry system using high purity germanium (HPGe) detector. The results of samples measurements showed that three contaminated area with 238U and 235U found in the study area. Two scenarios were applied for each contaminated area to estimate the dose using RESRAD (onsite) version 7.0 code. The total dose of resident farmer scenario for area A, B and C are 0.854, 0.033 and 2.15×10-3 mSv.yr-1, respectively. Whi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref