Preferred Language
Articles
/
jpgiafs-422
Rationalization the costs and improve seed quality under the application of biotechnology: An Applied Research in Ministry of Agriculture - the Directorate of Inspection &Certification of Seeds
...Show More Authors

The importance of this research has been to rationalize the cost of producing maize seeds through the followers of modern techniques and methods in agricultural activities such as genetic engineering for the purpose of increasing production efficiency of maize seeds as well as the importance of calculating seed cost rationalization through the ABC system and thus rationalizing government spending. The research is based on a single hypothesis that the use of genetic engineering on corn seeds works to:increase production efficiency of seeds and savings in agricultural inputs, calculation of rationalization through the cost system on the basis of activity ABC The research reached a number of conclusions, the most important of which: The application of genetic engineering to maize seeds achieves productivity efficiency to meet the needs of the market and farmers of seed, which is a raw material involved in agriculture. The research led to a number of recommendations, including: Genetic engineering as a means to provide seeds in sufficient quantities to meet the needs of the market and farmers of seeds

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Emerging Trends In Mechatronics
Interactional Modeling and Optimized PD Impedance Control Design for Robust Safe Fingertip Grasping
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Thermal Analysis Study and Antioxidant Activity for Some Metal Ions Cr (III), Fe (III), Mn (II) and Pd(II) Complexes with Azo Dye Derived from p-methyl-2-hydroxybenzaldehyde
...Show More Authors

ليكاند ازو جديد. 4-((3-formyl-2-hydroxyphenyl)diazenyl)-N-(5-methylisoxazol-3-yl)benzenesulfonamide, الليكاند المحضر استعمل لتحضير معقدات من ايونات معادن مختلفة مثل الكروم الثلاثي والمنغنيز الثنائي والحديد الثلاثي  والبلاديوم الثنائي بنسب مولية (1:1) ( ليكاند : فلز) نتائج التشخيص للمركبات يتقنيات مطيافية الاشعة فوق البنفسجية الاشعة تحت الحمراء الرنين النووي المغناطيسي البروتوني والكربوني وطيف الكتلة والتحليل الدقيق للعناصر ومحتوى الفلز وال

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 17 2024
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
استعمال التحليل الهرمي لتطبيق بطاقة الأداء المتوازن في تقييم الأداء الاستراتيجي للهيئة العامة للأثار والتراث - دراسة تطبيقية
...Show More Authors

هدف هذا البحث الى استعمال الأسلوب الرياضي أسلوب التحليل الهرمي وتطبيقه وفق ابعاد بطاقة الاداء المتوازن في تقييم الأداء الاستراتيجي في الهيئة العامة للأثار والتراث، وتمثلت أدوات البحث باستعمال استمارات التحليل الهرمي وطبقت على معايير بطاقة الأداء المتوازن المتمثلة في (المالي، الزبائن، العمليات الداخلية، والتعلم والنمو)، وتم استهداف عينة قصدية متمثلة في رئيس الهيئة والمدراء العامون بعض من مدراء الأقسام ال

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Land Use/Cover Change Analysis Using Remote Sensing Data: A Case Study, Zhengzhou Area, Henan Province, China
...Show More Authors

In the last two decades, arid and semi-arid regions of China suffered rapid changes in the Land Use/Cover Change (LUCC) due to increasing demand on food, resulting from growing population. In the process of this study, we established the land use/cover classification in addition to remote sensing characteristics. This was done by analysis of the dynamics of (LUCC) in Zhengzhou area for the period 1988-2006. Interpretation of a laminar extraction technique was implied in the identification of typical attributes of land use/cover types. A prominent result of the study indicates a gradual development in urbanization giving a gradual reduction in crop field area, due to the progressive economy in Zhengzhou. The results also reflect degradati

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
رؤساء رؤساء النصارى في كتاب أخبار بطاركة كرسي المشرق (132- 542هـ/ 749- 1147م) دراسة تأريخية (القسم الأول)
...Show More Authors

The research deals with the Presidents of the Christians who called themselves (Ghaltka) in the book titled (orient chirsy patriarchs) that talked about their scientific practical biography adding to) that their completeness on the position of Ghaltka with its decrees and caliphs who were contemporaries to them ,as well as their places, deaths, cemeteries and their accomplishments In accordance with the powers granted to them and also it mentions the situation of The Abbasid caliphate with them and with the sons of their sect .

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Problemas en la Traducción de la Fraseología del Español al Árabe en el Texto Literario ( Un Estudio Comparativo desde el Punto de Vista Traductológico)
...Show More Authors

Problems in the Translation of Spanish phraseology to Arabic in the Literary Text (A Comparative Study from the Perspective translatological)

 

Abstract

One of the most common problems facing the translator is the identification and subsequent search for correspondences of phraseological units. The importance of the phraseological competence in a foreign language is widely recognized by many authors (Howarth, Corpas Pastor, Pamies Bertran, to name a few).

We must lose our fear to recognize that the domain of the phraseology is the highest level of command of any language. The objective of the present study is to clarify the differences in UFS Spanish to Arabi

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 13 2018
Journal Name
Arab Science Heritage Journal
الثروة الثروة المائية في المغرب العربي من القرن 4 – 7 هـ/ 10 م – 13 م دراسة تاريخية
...Show More Authors

Water resources would be differentiate in Morocco specially in Morocco  which appear as form of eyes ,rivers as dissolved water of mountain.

The human takes care of water either as rains to store and use in necessity trying to bring it to Maracas  by  helping from state

View Publication Preview PDF