Preferred Language
Articles
/
whfCXI8BVTCNdQwCUm7Z
Composition effects on formation energies, electronic and vibrational properties of ZnCdS wurtzoid molecules: A DFT study
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (230)
Crossref (176)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal University Of Kerbala
Histological study on the ovaries of female mice treated by carbamazepine
...Show More Authors

The purpose of this study was to examine the association of oral administration of Carbamazepine during pregnancy and the histological changes in the ovaries of mice. Timed-pregnant mice were divided into experimental and control groups. 60 mice in the experimental group received daily oral of 15 mg/kg of carbamazepine via intragastric tube on gestational days 0 to 18. 20 mice were used as control group. They received normal saline via the same route. Dams underwent laparotomy on pregnancy days 13, 15, and 18 and the ovaries were collected. Routine histological processing of the ovaries histology of paraffin sections stained with haemotoxylin and eosin, were conducted. The ovary under the effect of the drug, there was signs of degeneration

... Show More
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Study on tssC1 Gene Mediating Biofilm Antibiotics Resistance of Pseudomonas aeruginosa
...Show More Authors

P. aeruginosa is a famous bacterium that causes several diseases and has a high ability to be a multidrug resistant organism that is linked with the formation of biofilm. This study aimed to investigate tssC1 gene role in the resistance of different antibiotics in the presence of biofilm. We constructed biofilm for the isolates under the study and showed the effect of different antibiotics on biofilm formation and maturation. The presence of the gene was detected through achieving PCR reaction. Finally, tssC1 gene variation was determined through sequencing and aligning the sequencing products. The results showed that most of the isolates (80%) formed biofilm that played a role in the resistance of different antibiotics which could

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between social capital and knowledge sharing and their impact on improving the educational service quality: an analytical study of the views of a sample of academic staffs in the government universities in the Kurdistan Region of Iraq
...Show More Authors

Abstract

This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of banking effort tests in the face of monetary credit risk and its impact on the profits and adequacy of the bank’s capital : / a case study of Sumer Commercial Bank for the period from 2015 to 2020
...Show More Authors

The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.

View Publication Preview PDF
Publication Date
Thu Oct 09 2025
Journal Name
Iraqi Journal Of Biotechnology
STUDY ON TOTAL PEROXIDASE ENZYMES ACTIVITIES AND SOME TRACE ELEMENTS IN PATIENTS WITH BREAST TUMORS
...Show More Authors

View Publication Preview PDF