Preferred Language
Articles
/
rRfpLo8BVTCNdQwCYl3K
Influence of cytokinins and sucrose concentrations on bulblet characters of In Vitro Hippeastrum Hybridum
...Show More Authors

Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 07 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Assessment of the Level of Trace Metals in Commonly Edible Vegetables and Fruits of Baghdad City (Iraq)
...Show More Authors

A study was carried out to determine the concentrations of trace metals in vegetables and fruits, which are locally available in the markets of Baghdad-samples of fourteen varieties of vegetables and fruits, belonging to Beta vulgaris, Brassica rapa, Daucus carota, Allium cepa, Eurica sativa, Malva silvestris, Coriandrum Sativum, Trigonella Foenum craecum, Anethum graveolens, Barassica oleracea, Phaseolus vulgaris, citrus reticulata, Py rus malus, and Punica granatum. Analysis for Cd,Pb, Mn, Fe, Co, Ni, Cu and Zn were determined by flame atomic absorption sp ectrophotometry. The results indicated that the Malva silvestris recorded the highest concentrations of Cd and Mn while Allium cepa showed the highest concentrations of Pb and Cu. But E

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Transportation Research Procedia
The importance of intelligent transport systems in the preservation of the environment and reduction of harmful gases
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of electronic audit in raising of the independence and professional efficiency of the internal auditor
...Show More Authors

The research aims to shed light on the role of E-Audit in raising Independence and professional competence of the external auditor, the study has been applied on a sample of the branches of the Rafidain Bank n have been addressed research topic beside the theoretical, as put forward by the literature of accounting, audit and that the contents of the section first, either the practical side was required to test the hypotheses use form questionnaire, which was distributed to a sample of the external auditors and bankers research sample. He has applied for his part in the search for a standard of independence and professionalism of the external auditor and the factors influencing these standards, and the most import

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Value of Ultrasonography in The Diagnosis and Evaluation of Early Therapeutic Response of Cervical Tuberculous Lymphadenitis
...Show More Authors

ABSTRACT Background: Tuberculosis is a worldwide infectious disease in spite of advancement in health care system. Tuberculous lymphadenitis is the most prevalent form of extra pulmonary tuberculosis with predilection of cervical lymph nodes. Objectives: To evaluate the reliability of grey scale ultrasonography together with color Doppler in the diagnosis of cervical tuberculous lymph adenitis and evaluation of early therapeutic response. Subjects and methods:From July 2015 to May 2016 in Al-Karama teaching hospital /Kut city- Wasit-Iraq, 25 patients (14 males and 11 females) with ages range from (6-50) years. Ultrasonography examination was done for all patients and grey scale criteria (distribution, size, shape, echogenicity, echogenic hi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetics of the sculptural formulations of swords in the Al-Kafeel Museum of Treasures and Manuscripts
...Show More Authors

The research included (the aesthetics of the sculptural formulations of swords in the Al-Kafeel Museum) four chapters. Al-Kafeel Museum.)
Within the time period: (1240 AH / (1824 and 1825) AD - 1312 AH / (1894 and 1895) AD). The second: the types of Islamic swords. The third chapter included (research procedures), and the analysis of samples from the sample (3) as a model according to the descriptive approach, and the fourth chapter dealt with (results, conclusions, recommendations, and proposals). As well as recommendations, proposals and sources.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The social imagination and its representations in the paintings of students of the Department of Art Education
...Show More Authors

The aim of this research is to identify how to employ the social imagination and its representations in the paintings of the students of the Department of Art Education. Students of the Department of Art Education in the light of this tool, and the researcher reached a number of results, the most important of which are:
1. The indicator of the social imagination in the excitement of the artist and the recipient, because the representations are embodied in forms within the painting and close to reality.
2. An artistic sample of the representational imagination and the creative imagination was found to be more than the imaginary imagination.
3. Individual symptoms related to the term.
4. The representations of the socia

... Show More
View Publication Preview PDF
Crossref