Preferred Language
Articles
/
6BYdRokBVTCNdQwC54cG
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

Crossref
View Publication
Publication Date
Wed Feb 01 2012
Journal Name
Ibn Al-haytham Journal For Pure And Applied Science
Using Restricted Least Squares Method to Estimate and Analyze the Cobb-Douglas Production Function with Applicatio
...Show More Authors

Publication Date
Sun Oct 02 2022
Journal Name
Engineering, Technology & Applied Science Research
Statistical Modeling for Traffic Noise: The Case of Kirkuk City
...Show More Authors

The auditory system can suffer from exposure to loud noise and human health can be affected. Traffic noise is a primary contributor to noise pollution. To measure the noise levels, 3 variables were examined at 25 locations. It was found that the main factors that determine the increase in noise level are traffic volume, vehicle speed, and road functional class. The data have been taken during three different periods per day so that they represent and cover the traffic noise of the city during heavy traffic flow conditions. Analysis of traffic noise prediction was conducted using a simple linear regression model to accurately predict the equivalent continuous sound level. The difference between the predicted and the measured noise shows that

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Improving Building Information Modeling (BIM) Implementation throughout the Construction Industry
...Show More Authors

Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Structural Design According to Constructal Theory in Architecture
...Show More Authors
Abstract<p>Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves </p> ... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
New Correlation for Predicting Undersaturated Oil Compressibility for Mishrif Reservoir in the Southern Iraqi Oil Fields
...Show More Authors

Reservoir fluids properties are very important in reservoir engineering computations such as material balance calculations, well testing analyses, reserve estimates, and numerical reservoir simulations. Isothermal oil compressibility is required in fluid flow problems, extension of fluid properties from values at the bubble point pressure to higher pressures of interest and in material balance calculations (Ramey, Spivey, and McCain). Isothermal oil compressibility is a measure of the fractional change in volume as pressure is changed at constant temperature (McCain). The most accurate method for determining the Isothermal oil compressibility is a laboratory PVT analysis; however, the evaluation of exploratory wells often require an esti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering &amp; Technology
Hybrid DWT-DCT compression algorithm &amp; a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More