Preferred Language
Articles
/
6xcWoJIBVTCNdQwC8bpl
La faculté articulatoire de l'apprenant irakien Dans une classe de français langue étrangère A l’université de Bagdad Etude comparative
...Show More Authors

Publication Date
Mon Oct 01 2012
Journal Name
2012 Ieee International Conference On Circuits And Systems (iccas)
A survey of on-chip monitors
...Show More Authors

Systems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 21 2012
Journal Name
Arabian Journal For Science And Engineering
A Procedure for Analysing Reinforced Embankments
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Chronic Subdural Hematoma A Prospective Study
...Show More Authors

Background: Chronic subdural hematoma is a blood collection in the subdural space for more than 3 weeks from the onset of the bleeding. It is more likely to develop in infancy and after the age of 60 years. The incidence of subdural hematoma is 1- 2 per 100,000 people per year.
Objective: To delineate the most common feature aspects of SDH like age, predisposing factors, symptoms and signs and different types of management of the disease.
Patients and Methods: A prospective study of 40 patients from the period January 2012 - January 2014, and conducted in Gazi Al-Hariri Hospital of Surgical Specialties, disregarding the age, complaining of chronic subdural hematoma as proved by CT

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
A Tile with Nested Chain Abacus
...Show More Authors

This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Imagination as a Path to Reality
...Show More Authors

Imagination as a Path to Reality

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Grey Wolf Optimization Algorithm: A Survey
...Show More Authors

     The Gray Wolf Optimizer (GWO) is a population-based meta-heuristic algorithm  that belongs to the family of swarm intelligence algorithms inspired by the social behavior of gray wolves, in particular the social hierarchy and hunting mechanism. Because of its simplicity, flexibility, and few parameters to be tuned, it has been applied to a wide range of optimization problems. And yet it has some disadvantages, such as poor exploration skills, stagnation at local optima, and slow convergence speed. Therefore, different variants of GWO have been proposed and developed to address these disadvantages. In this article, some literature, especially from the last five years, has been reviewed and summarized by well-known publishers. Fir

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Al-wakidi as a documentary historian
...Show More Authors

This research is about the resources and the way of al-Waqidi in his
researching of al-sira of the Prophet. And what happened in the first of Islam.
This research is about the documents which al-Waqidi had it. Some of it,
which he had visited, was the places, especially the periods which the events had took
place in. He was asking those whom were contemporary to the happenings, from the
sons of al-Sahaba and al-Tabi’een.
Also this research is lightening on the new studies that gave this historian a
good respect during his work, in which he could gave the reality about his authorship.
The research is trying to draw real way of al-Waqidi and what were reported by him,
especially the documents, and what he had s

... Show More
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review
...Show More Authors

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
A trade union movement in Britain
...Show More Authors

Labor movement is considered important in Britain because it is an international phenomenon of the feudal system and one of the flowerings of the era of the capitalist machine. At the beginning of the 18th century, the world witnessed a change and progress in many aspects of the industrial fields such as the different means of production .this era is called the industrial revolution which especially appeared in Britain and extended to other areas of the world .it leads to many changes in Europe and participated in different economic, political and cultural and social fields. and it has a very important role in progress and development but its disadvantage is that it is exploited by the capitalists to achieve their special rights .in othe

... Show More
View Publication Preview PDF