Preferred Language
Articles
/
rBZNQ4cBVTCNdQwChz5Y
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

Crossref
View Publication
Publication Date
Wed Jan 23 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of external borrowing to bridge the federal budget deficit of the Republic of Iraq
...Show More Authors

 The deficit budget, one of the results of increased public spending for their revenues due to the economic pressures imposed by the interest of the economies of those countries from the need to increase government spending in order to revitalize the national economy and accelerate economic growth rates and provide employment to the growing levels of unemployment in those countries opportunities and what is required to address the current debt crisis (borrowing), which has become a big burden on the governments and the need to move towards the application of austerity spending and tax increases, which inevitably forced those countries will be reflected reduced spending on basic aspects of life and their peoples, particularly earners

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Educational dimensions of children's television programs in the light of the universal rights of child
...Show More Authors

The research aims at determining the type of educational dimensions to be broadcasted in children's television programs, clarifying the technical forms used in children's TV programs, analyzing the educational dimensions provided by children's television programs, and studying the educational dimensions of children's television programs. The researcher used a sample of children's programs: all of us heroes, which is a daily program on the mbc3 channel as well as the program of Tel flowers on the Algerian channel. The researcher designed an analysis content form included categories of analysis. Spss program was used to process the collected data. The research reached several results; the concentration of educational dimensions in

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
THE SIGN READING OF THE STRUCTRE OF UNIFICATION IN THE CIVILIZATION OF MESOPOTAMIA: جهينة حامد حساني
...Show More Authors

The Mesopotamian artist conversed the functions of idols with multi-formation, varied pictured and structural significances sign momentum. Each phenomenon had an idol and each event had an idol. So multiplicity contributes in the enrichment of the Mesopotamian thought by the full and comprehensive familiarity of the characterization of the religious space which reached up to realize the start point of creation and formation and specify the concept of unification in such a way that considered as pagan multiplicity and Atheism according to what brought by most of the previous studies.Such a research as ( The Sign Reading of the Structure of Unification in the Civilization of Mesopotamia) aims to clarify this confusion through decoding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2019
Journal Name
Journal Of Planner And Development
The environmental impacts of reviving Hor Alsnav By the water of the river of out fall drain in the province of Dhi Qar
...Show More Authors

The aim of this study is to explain methods to be followed for the recovery Alsnav Hor, who represents the northwest portion of the Hammar Marsh in the province of Dhi Qar, after the drought in which that happened in 2008. The study included description of the region before the drought, the description of its natural and human environments, the economic events and activities, then the study included drought throughout the region, the environmental impacts caused by drought, its impact on social reality, economic and healthy for its environment, and then reached to the problems of social and economic in the region, depending on the Field studies and documented in the specialized government departments, information analysis for the

... Show More
View Publication
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Journal Of Science
Paper based glucose biosensor depending on SPCE modified with hemoglobin and silver nanoparticles
...Show More Authors

The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li

... Show More
Scopus
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref