Preferred Language
Articles
/
pBjBIZgBVTCNdQwCKrmR
Ultra HPLC method development and validation for the determination of meclizine in pharmaceutical formulation
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal control and its role in the reform of the tax work: Applied research in the General Commission for Taxes
...Show More Authors

That internal control is particularly important in improvingperformance and tax reform، they play an important role in the regularity ofwork and development and the anti corruption and activating the decisionsand tax legislation، as contained in the organizational plan and the means،procedures and components designed from which to ensure a policy andimplementation plans The research aims to review the reality of the internalcontrol in the General Commission for Taxes and stand on the deficiencies init, with the strengthening of the role of internal control in the GeneralAuthority for taxes based on the laws and regulations and by using modernmeans to work as well as developing the performance of employees in thebody، including helpin

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
Electoral appeals and the separation of organic health In the Constitution of the Republic of Iraq for the year (2005)
...Show More Authors

الخلاصة

تعد الانتخابات بمثابة الطريق المؤدي إلى الديمقراطية كونها النمط الأكثر شيوعاً لمشاركة المواطنين في الحياة السياسية للبلدان واختيار ممثليهم في المجالس التشريعية، حيث أن مطلب إجراء انتخابات حرة ونزيهة لم يعد مطلباً داخلياً فحسب بل مطلباً دولياً يصرّ المجتمع الدولي على الوفاء به وهذا يلقي على عاتق كل دولة أن تضع من الضمانات ما يكفل ممارسة هذه الانتخابات ب

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
The Exposition of University Youth to Television Advertising and its Reflection on the Development of their Cognitive Abilities A survey of students (College of Media / University of Baghdad) as ample
...Show More Authors

This research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis of the relationship between inflation and the tax revenue in Iraq for the period 1990-2010
...Show More Authors

The Iraqi economy has suffered for a long period of inflation because of the Iraq war and the resolutions and the sanctions that were imposed on Iraq, this phenomenon overshadowed at various aspects of the economy including the tax revenue that the State seeks to optimize the total income for the budget, the research covers the years 1990-2010, these years have been divided according to the country's economic variables.

The research  adopted on econometrics analysis that is based on the information and data available on topics and has been using statistical methods to test functions are formulated.

Research concluded that rates of inflation and GDP impact is limited to direct taxation and indirect in current prices a

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Complexity
Bayesian Regularized Neural Network Model Development for Predicting Daily Rainfall from Sea Level Pressure Data: Investigation on Solving Complex Hydrology Problem
...Show More Authors

Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref