Preferred Language
Articles
/
pBZev4sBVTCNdQwCL9oc
Advancement and Validation of new Derivatives Spectrophotometric Method for Individual and Simultaneous Estimation of Diclofenac Sodium and Nicotinamide
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Physics
Theoretical Investigations of Electronic and Optical Properties of Vanadium Doped Wurtzite Zinc Oxide from First Principle Calculation Method
...Show More Authors

In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the ban

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Detailed interpretation of Sheikh Abdullah Knon A look at the curriculum and method of innovation Critical inductive study
...Show More Authors

The problem lies in the main research Where the site of this interpretation of the books of interpretation and what is new and how?
The objectives of this research Vjat to give a quick overview of Sheikh Kenon and the qualifications that made him interpreter, as the goal of the research to reveal the method of Sheikh Kenon highlighting what he has and what is new and show.
The researcher used the inductive method to read the whole book and the comparative approach to compare it with others. He also used the critical method to distinguish between the positions of strength and weakness in the book. The most important results are as follows: :
1 - Sheikh Abdullah Kenon language writer familiar with many sciences, such as jurisprude

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The method of ABC and it, s roules in the Determining the cost of the Project constraction sector
...Show More Authors

Abstract

The basic orientation of the research is an attempting to apply the cost determining method according in the contract sector projects for Al- Iraq ceneral company, that this subject has a big value according to its modernity and  its influence on the future  and the eaning of the company.

The research aims to find out the effect of the method for determining cost based on the activity in determining the cost of the construction sector projects.The research was conducted in Iraq General Company for the implementation of irrigation projects. Bani search on three assumptions, the first is (that the application of the method for determining the cost on the basis of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2009
Journal Name
مجلة ديالى للبحوث الانسانية
Synthesis and study of new Macrocyclic ligand type N2O2 and its complexes with (Co (II) ,Ni (II) ,Cu (II) ,Zn (II) and Cd (II)) ions.
...Show More Authors

A new Schiff base ligand [L] [3-methyl-9,10 phenyl -6,7 dihydro-5,8 –dioxo-1,2 diazo –cyclo dodecu 2,11-diene ,4-one ] and its complexes with (Co(II), Ni(II), Cu (II), Zn(II) and Cd(II)) were synthesis.This ligand was prepared in three steps, in the first step a solution of salicyladehyed in methanol reacted under refluxed with hydrazine monohydrate to give an (intermediate compound 1) which reacted in the second step with sodium pyruvate to give an (intermediate compound 2) which gave the ligand [L] in the three step when it reacted with 1,2- dichloro ethane.The complexes were synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods [IR, UV-

... Show More
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Macton's Method for Developing Non-Linguistic Cognitive Sensory Skills for Autistic Spectrum Children
...Show More Authors

The present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Levothyroxine Therapy Adequacy, Dose Estimation and Vitamin D Effect Assessment in a Sample of Iraqi Female Patients with Different Causes of Hypothyroidism
...Show More Authors

Exogenous levothyroxine dose modulation and euthyroidism achievement is a persistent challenge in clinical settings. This study strives to assess the adequacy of treatment and identify the patients’ factors that can be used to estimate the euthyroid levothyroxine dose. A secondary objective was to assess vitamin D supplementation impact on thyroid status.

A review of a prospectively collected information from 142 female patients from Baghdad Center of Nuclear Medicine from June 2019 until March 2020 who were receiving levothyroxine for different causes was done. After a follow-up period, the patients’ thyroid tests were assessed and the euthyroid doses for each cause category were statistically analyzed. Thyroid function was

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
On Shrunken Estimation of Generalized Exponential Distribution
...Show More Authors

This paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.

The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha

... Show More
View Publication Preview PDF
Crossref