Preferred Language
Articles
/
yhdaPo4BVTCNdQwCqz41
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Fri Oct 12 2018
Journal Name
International Journal Of Dynamics And Control
Decentralized adaptive partitioned approximation control of high degrees-of-freedom robotic manipulators considering three actuator control modes
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 21 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Sun Sep 01 2024
Journal Name
Journal Of Energy Storage
Nanofluid-assisted enhanced sealing security for efficient geological hydrogen storage in Saudi Arabian basalt
...Show More Authors

The modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif

... Show More
View Publication
Scopus (18)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Display, analyze and evaluate the alternatives selected models used in the measurement and disclosure of corporate social responsibility
...Show More Authors

       The economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 09 2025
Journal Name
Scientific Reports
Machine learning models for predicting morphological traits and optimizing genotype and planting date in roselle (Hibiscus Sabdariffa L.)
...Show More Authors

Accurate prediction and optimization of morphological traits in Roselle are essential for enhancing crop productivity and adaptability to diverse environments. In the present study, a machine learning framework was developed using Random Forest and Multi-layer Perceptron algorithms to model and predict key morphological traits, branch number, growth period, boll number, and seed number per plant, based on genotype and planting date. The dataset was generated from a field experiment involving ten Roselle genotypes and five planting dates. Both RF and MLP exhibited robust predictive capabilities; however, RF (R² = 0.84) demonstrated superior performance compared to MLP (R² = 0.80), underscoring its efficacy in capturing the nonlinear genoty

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Box and Jenkins use models to predict the numbers of patients with hepatitis Alvairose in Iraq
...Show More Authors

The time series of statistical methods mission followed in this area analysis method, Figuring certain displayed on a certain period of time and analysis we can identify the pattern and the factors affecting them and use them to predict the future of the phenomenon of values, which helps to develop a way of predicting the development of the economic development of sound

The research aims to select the best model to predict the number of infections with hepatitis Alvairose models using Box - Jenkins non-seasonal forecasting in the future.

Data were collected from the Ministry of Health / Department of Health Statistics for the period (from January 2009 until December 2013) was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
The 2nd Universitas Lampung International Conference On Science, Technology, And Environment (ulicoste) 2021
A comparison between IRI-2016 and ASAPS models for predicting foF2 ionospheric parameter over Baghdad city
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
A Study on Transportation Models in Their Minimum and Maximum Values with Applications of Real Data
...Show More Authors

The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs

... Show More
View Publication Preview PDF
Crossref