Preferred Language
Articles
/
kxbui4cBVTCNdQwCsVX8
Discussion on Bipolar Fuzzy n-fold KU-ideal of KU-algebras
...Show More Authors

Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Scholars’ confrontation on atheistic thought in modern Turkey Saeed Nursi is an example
...Show More Authors

The Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of ​​land they ruled.  In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.

 

After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Strategic leadership according to the outstanding banking performance analystical study on private banks
...Show More Authors

This research aimd to analyze the role of strategic entreprenenial on according to the external performance of a sample of Iraqi private banks, namely, (National Islamic Bank, Iraqi Ahli Bank, Baghdad Bank , Middle East Iraqi Investment Bank) has launched research in fundamental problem stems from the question seeking his response to the characterization of the problem which is improve banking performance through strategic entreprenenial and to achieve the goal of the research was to prepare a questionnaire included a number of questions about the independent research and approved variables accounting for the independent variable strategic entreprenenial and included four dimensions (entreprenenial culture), entreprenenial leader

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (259)
Crossref (195)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Reinsurance risks and their reflex on the financial performance of the National Insurance Company: Applied Research in Maritime Insurance Branch
...Show More Authors

The research dealt with the risks of reinsurance and its impact on the financial performance of the National Insurance Company by focusing on reinsurance in the marine insurance branch. Negative impact on the financial performance of the NICs and the Marine Insurance Branch. The research sample resulted in a main hypothesis that reflects this relationship. Lee in the analysis of financial information reports National Insurance Company of the branch of marine insurance for the period of 2010 until 2017, and the use of (retention) for measuring the re-insurance operations index, and (insurance financial surplus rate) to measure financial performance. For the purpose of obtaining the results, a number of statistical methods were used accord

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Social Responsibility and its Impact on the Financial Performance of Banks: Applied Research in the Iraqi National Bank
...Show More Authors

The objective of the research is to measure the impact of social responsibility on the financial performance of the National Bank of Iraq for the period from 2014 to 2016 (3 years) through discussing and analyzing the level of practice of the Bank of Baghdad for social responsibility and the impact on their financial performance during the period. To measure the independent variable (CSR), the researcher used the CSR Disclosure Index and relied on the ROA as an indicator to measure the dependent variable (financial performance). The results of the research showed the main hypothesis of the research, which states that the social responsibility of the banks has no significant impact on the financial performance. In relation to the disclosu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Dispersal and Development of Powdery Mildew Disease Caused by Oidiopsis haplophylli on Ornamental Plants (Nasturtium) Tropaeolum majus L. in Baghdad
...Show More Authors

This study wass carried out to investigate the incedence of powdery mildew disease on ornamental plants (Nasturtium) Tropaeolum majus L. caused by Oidiopsis haplophylli in some nurseries of Baghdad area and in fields at college of Agriculture /University of Baghdad. This study was conducted in tow succesive seasons of 2011-2012 (April and May). The survey indicated that the Mildew disease existe in the following nurseries (Al-Adhamiya 97.5% ,Palestine street 93.8%, Zayouna 86.0%, and 100% in two fields at college of Agriculture. It has been found that the disease severity was developed in Agriculture college fields successively from 12-4-2011 to 20-5-2011 and from 12-4-2012 to 20-5-2012 (18.0–98.0 % and 22.7–96.0% )for the two sea

... Show More
View Publication Preview PDF
Crossref