Preferred Language
Articles
/
4BjH65cBVTCNdQwCZait
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

The aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.

Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
PDCNN: FRAMEWORK for Potato Diseases Classification Based on Feed Foreword Neural Network
...Show More Authors

         The economy is exceptionally reliant on agricultural productivity. Therefore, in domain of agriculture, plant infection discovery is a vital job because it gives promising advance towards the development of agricultural production. In this work, a framework for potato diseases classification based on feed foreword neural network is proposed. The objective of this work  is presenting a system that can detect and classify four kinds of potato tubers diseases; black dot, common scab, potato virus Y and early blight based on their images. The presented PDCNN framework comprises three levels: the pre-processing is first level, which is based on K-means clustering algorithm to detect the infected area from potato image. The s

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 04 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Bioadsorption of Heavy Metals From Industrial Wastewater Using Some Species of Bacteria
...Show More Authors

Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The vision of Hebrew writers and critics of the future of the Jews in their writings at the end of the 19th century and the beginning of the twentieth c: דעותיהם של הסופרים והמבקרים העבריים על עתידם של היהודים לפי כתבותיהם בשלהי המאה ה-19 ובתחילת המאה ה-20
...Show More Authors

It is very known  how great is the  role of the Jewish writers in the system of the Zionist movement. The movement relied on writers and writers to carry out their programs, especially those pertaining to the creation of a "national homeland" for Jews. Most Jewish writers sang of  Palestine even though they were not born there.

    On such a  basis, we have followed closely the writings of writers, critics and others by the end of the nineteenth century and the beginning of the twentieth century. We found that these writings are based on one common question: What is the fate of the Jewish people?

    Most of these writings were accompanied by Theodor Herzl's proj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
مقترح اسلوب IRWs الحصين لتقدير أنموذج الانحدار المقسم لحركة حمولة قاع نهر دجلة ونقطة التغيير لكمية تصريف المياه عند مدينة بغداد
...Show More Authors

              يتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب الت

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Proposing Robust IRWs Technique to Estimate Segmented Regression Model for the Bed load Transport of Tigris River with Change Point of Water Discharge Amount at Baghdad City
...Show More Authors

Segmented regression consists of several sections separated by different points of membership, showing the heterogeneity arising from the process of separating the segments within the research sample. This research is concerned with estimating the location of the change point between segments and estimating model parameters, and proposing a robust estimation method and compare it with some other methods that used in the segmented regression. One of the traditional methods (Muggeo method) has been used to find the maximum likelihood estimator in an iterative approach for the model and the change point as well. Moreover, a robust estimation method (IRW method) has used which depends on the use of the robust M-estimator technique in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Open Life Sciences
Evaluation of the role of some non-enzymatic antioxidants among Iraqi patients with non-alcoholic fatty liver disease
...Show More Authors
Abstract<p>Non-alcoholic fatty liver disease (NAFLD), characterized by hepatic fat accumulation in individuals consuming little or no alcohol, has become highly prevalent globally. Oxidative stress plays a central role in instigating inflammation and cell death pathways driving NAFLD progression. This case–control study aimed to elucidate the association between circulating levels of the pivotal non-enzymatic antioxidants – coenzyme Q10 and vitamins E and C – and liver injury parameters among 60 Iraqi NAFLD patients versus 30 healthy controls. NAFLD diagnosis entailed over 5% hepatic steatosis on ultrasound excluding other etiologies. Patients spanned three age groups: 20–29, 30–39, an</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF