Preferred Language
Articles
/
shco8I0BVTCNdQwCXym8
PRELIMINARY PHYTOCHEMICAL SCREENIG AND HIGH PERFORMANCE THIN LAYER CHROMATOGRAPHY[HPTLC] DETECTION OF PHENOLIC ACIDS IN LANATA CAMARA LEAVES CULTIVATED IN IRAQ
...Show More Authors

Crossref
View Publication
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Influence of substrates on the properties of cerium -doped CdO nanocrystalline thin films
...Show More Authors

Transparent thin films of CdO:Ce has been deposited on to glass and silicon substrates by spray pyrolysis technique for various concentrations of cerium (2, 4, and 6 Vol.%). CdO:Ce films were characterized using different techniques such as X-ray diffraction (XRD), atomic force microscopy(AFM) and optical properties. XRD analysis show that CdO films exhibit cubic crystal structure with (1 1 1) preferred orientation and the intensity of the peak increases with increasing's of Ce contain when deposited films on glass substrate, while for silicon substrate, the intensity of peaks decreases, the results reveal that the grain size of the prepared thin film is approximately (73.75-109.88) nm various with increased of cerium content. With a sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
The effect of annealing temperatures on the optical parameters of NiO0.99Cu0.01 thin films
...Show More Authors

NiO0.99Cu0.01 films have been deposited using thermal evaporation
technique on glass substrates under vacuum 10-5mbar. The thickness
of the films was 220nm. The as -deposited films were annealed to
different annealing temperatures (373, 423, and 473) K under
vacuum 10-3mbar for 1 h. The structural properties of the films were
examined using X-ray diffraction (XRD). The results show that no
clear diffraction peaks in the range 2θ= (20-50)o for the as deposited
films. On the other hand, by annealing the films to 423K in vacuum
for 1 h, a weak reflection peak attributable to cubic NiO was
detected. On heating the films at 473K for 1 h, this peak was
observed to be stronger. The most intense peak is at 2θ = 37

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 28 2025
Journal Name
International Linguistics Research
A Pragmatic Analysis of Modality in English Academic Texts in Nigeria and Iraq تحليل تداولي للتصويغية في النصوص الانكليزية في نيجيريا و العراق
...Show More Authors

Despite scholars’ attention on the typology of modality as a linguistic phenomenon, yet the use of modality across varieties of English is not well visible in communication-based researches that take semantics, pragmatics and discourse issues as the objects for their investigation. The paper generates its data from six M. A. dissertations from Nigerian University and equal number of the M. A. dissertations from Iraqi University to qualitatively and quantitatively investigate the contextual use of modality within the pragmatic perspective. The data analysis reveals that modality such as usuality, potentiality, necessity, probability and obligation in the dissertations encapsulates interpersonal and authorial voice in which the mean

... Show More
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of business incubators represented by the banking system in financing small and medium enterprises in Iraq for the period 2000-2010
...Show More Authors

The process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.

What encouraged countries to pay attention to these institutions is the ease of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 27 2023
Journal Name
Journal Of Global Innovations In Agricultural Sciences
The use of remote sensing technology in defining the water depth in the lakes and water bodies: Western Iraq as a case study
...Show More Authors

The study's primary purpose is to explore an appropriate way of monitoring and assessing water depths using the satellite remote sensing technique of the Al Habbaniyah Lake in Iraq. This research studied the experience-conditions (thresholds) of different bands for multi-temporal satellite image data with different satellite image sensors (Landsat 5-TM, and EO1-ALI) for the same region, to recognize regions of water depths. The threshold values are taken that to separate the Al Habbaniyah Lake to the required depths (shallow, deep, and very deep), as a supervised method. A three-dimension feature space plot had used to represent these regions. The relationship of the mean values of the three separated water regions with all TM and A

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Performance Auditing Process Pursuant to the Programs and Policies Guide in improving the health insurance Prosperity: applied research in the Iraqi General Insurance Company
...Show More Authors

Abstract

              The research’s goal lies in demonstrating the impact of the Federal Financial Supervision Endowment through the process of auditing the performance of the entities subject to its audit as to improve the performance of these entities, especially if the performance audit method is one of the newly applied methods that are compatible with the standards issued by the International Organization of Financial Supervision and Accounting Institutions which is the method of auditing performance according to the performance evaluation guide for programs and policies issued by the Federal Office of Financial Supervision.

 T

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref