Preferred Language
Articles
/
lRaeNowBVTCNdQwC0_kS
Can developing countries face novel coronavirus outbreak alone? The Iraqi situation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Food Chemistry
Rapid determination of thiabendazole in juice by SERS coupled with novel gold nanosubstrates
...Show More Authors

View Publication
Scopus (106)
Crossref (103)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 26 2021
Journal Name
Life-cycle Civil Engineering: Innovation, Theory And Practice
Shear performance of a novel demountable connector for reusable steel-concrete composite structures
...Show More Authors

A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 21 2024
Journal Name
Pharmacia
Synthesis and biological activity evaluation of new isatin-gallate hybrids as antioxidant and anticancer agents (in vitro) and in silico study as anticancer agents and coronavirus inhibitors
...Show More Authors

Background: The hybrid compounds hold promise for developing novel pharmaceuticals, potentially exhibiting greater activity, mainly against viruses and cancer diseases, than their components.

Objective: In this study, researchers explored the potential synergistic effects of hybrid molecules by designing and synthesizing a series of isatin-gallate hybrids, denoted as N’-(5-substituted-2-oxoindolin-3-ylidene)-3,4,5-trihydroxybenzohydrazide (3a–d).

Methods: Isatin-gallate hybrids (3a–d) were synthesized by reacting gallic hydrazide with each of the isatin analogs (2a–d). The structures of all produced comp

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using the Sherrod model in predicting financial failure in Iraqi private banks: an applied study in the Iraqi commercial and Iraqi Islamic banks
...Show More Authors

Abstract:

              The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year   . The research examines the use of

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
The Iraqi satellite channel marketing the Iraqi national identity during the protests: Research extracted from a doctoral thesis
...Show More Authors

The escalating development of technology is one of the distinctive features of the communication environment in the field of sending and receiving satellite broadcasts of television channels in general and Iraqi satellite channels in particular, which contributed to the wide and rapid spread and reaching outside the drawn boundaries and bypassing even natural obstacles, and what is important in this is the communication content that these broadcasts Channels and its impact on the recipient due to the media, cultural, educational and entertainment content it provides, and in our research we will analyze the communication content of the Iraqi satellite channel by choosing one of its dialogue programs that coincided with the events of the l

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 10 2017
Journal Name
Al–bahith Al–a'alami
Role of the Iraqi Media Organizations in Promoting The Sense of Citizenship among Iraqi University Youth
...Show More Authors

    This study examines the role played by the Iraqi media in promoting the values ​​of citizenship and the dimensions of the various sectors of Iraqi society, an important segment namely university youth section.
 The study intended to identify “the role of the Iraqi media organizations in promoting The sense of citizenship among young Iraqi university”, through: -
1. Identifying the most important Iraqi media, which works to promote the dimensions of citizenship and values.
2. To identify the extent of the contribution of the Iraqi media in promoting citizenship in dimensions (patriotic belonging, legal, political, economic, social, cultural).
The study provided a set of hypotheses, namely:-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
5th International Conference On Biomedical And Health Sciences
Exploiting Vpusm 8 Lytic Phage for The Bio- Control of V. Cholerae: A Novel Approach Against Cholera in The Era of Antibiotic Resistance
...Show More Authors

Objective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-

... Show More
View Publication
Crossref