Preferred Language
Articles
/
whZ58osBVTCNdQwCzeZw
The Impact of Teachers using Storytelling Techniques through Virtual Instruction to Increase English Speaking Ability
...Show More Authors

DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Aug 01 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
End-to-End Speaker Profiling Using 1D CNN Architectures and Filter Bank Initialization
...Show More Authors

The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Nurses’ Practices Concerning Isolation Techniques for Adult Leukemic Patients in Baghdad Teaching Hospitals
...Show More Authors

Objective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 29 2024
Journal Name
Chemical Engineering Research And Design
Comprehensive review of severe slugging phenomena and innovative mitigation techniques in oil and gas systems
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The impact of the Turkish intervention in northern Syria on the Syrian Turkish relations during (2011-2019)
...Show More Authors

This study aimed to provide a theoretical framework for the impact of the Turkish intervention in northern Syria and the extent of its impact on the relations between the two countries.

It also sought to answer the study's main question: What is the impact of the Turkish intervention in northern Syria on Turkish-Syrian relations during the period 2011-2019 ?.   

In this study, the historical method, the descriptive method, and the systems analysis method were used, with the aim of arriving at an accurate and realistic understanding of the Turkish-Syrian relations.

The study reached a set of results, the most important of which was that the Syrian-Turkish relations are based on interests, and that all alliances and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The impact of the US military variable in reality Security in the Arab Gulf region after 2003
...Show More Authors

The military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Loqmania commandments in the Koran And its impact in the refinement of the doctrine and morals emerging
...Show More Authors

Luqman's story stated that human instinct, if I was brought up properly, reaches wisdom and inflicts the right to everything. It is to go to worship God and adhere to the satisfaction of morals and high morals that are ordered to meet among human beings in this life, because this worship educates in the soul the most beautiful morals needed by human beings of honesty, honesty and modesty, and the work of good and virtues, and distancing the soul from evil and vices.

View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of corporate governance on narrowing the expectations gap in the audit work environment (field study)
...Show More Authors

The different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 28 2022
Journal Name
College Of Islamic Sciences
The impact of sins and disobedience on the individual and society in the Holy Quran objective study
...Show More Authors

     The Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..

View Publication Preview PDF