Preferred Language
Articles
/
8RYsRokBVTCNdQwCfYcV
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Wavelet and Forecasting Wind Speed with Application
...Show More Authors

Time series analysis is the statistical approach used to analyze a series of data. Time series is the most popular statistical method for forecasting, which is widely used in several statistical and economic applications. The wavelet transform is a powerful mathematical technique that converts an analyzed signal into a time-frequency representation. The wavelet transform method provides signal information in both the time domain and frequency domain. The aims of this study are to propose a wavelet function by derivation of a quotient from two different Fibonacci coefficient polynomials, as well as a comparison between ARIMA and wavelet-ARIMA. The time series data for daily wind speed is used for this study. From the obtained results, the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Geological Modeling for Yamama Formation in Abu Amood Oil Field
...Show More Authors

3D geological model of a simple petroleum reservoir for Yamama Formation has
been built in Abu Amood Oil Field using Petrel software, which is a product of
Schlumberger. This model contains the structure, stratigraphy and reservoir
properties (porosity and water saturation) in three directions(X, Y and Z).Geologic
modeling is an applied science of creating computerized representations of portions
of the earth's crust, especially oil and gas fields.
Yamama Formation in Abu Amood Oil Field is divided into thirteen zones by
using well logs and their petrophysical properties, six of which are reservoir zones.
From the top of the formation these six zones are: (YB-1, YB-2, YB-3, YC-1, YC-2
and YC-3). These reservoir

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2025
Journal Name
University Of Anbar Sport And Physical Education Sciences
The Impact of the Concept Maps Strategy in the Guided Discovery Method at Learning the Skill of Layup Shooting of Basketball
...Show More Authors

View Publication
Publication Date
Sun Dec 30 2018
Journal Name
Baghdad Science Journal
Optimization and Validation of RP-HPLC-UV/VIS Method for Determination Some Antioxidants in Dry Calyces of Iraqi Hibiscus Sabdraffia Linn
...Show More Authors

A new (Reversed Phase- High Performance Liquid chromatography) RP-HPLC method with Ultraviolet-Visible spectrophotometry has been optimized and validated for the simultaneous extraction and determination of antioxidants present in Iraqi calyces of Hibiscus Sabdraffia Linn. The method is based on using ultrasonic bath for extracting antioxidants. Limit of detection in μg/ml of Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthocyanins, Dephinidin-3-glucoside were113.8294×10-6,123.0453×10-6,70.3681×10-6,59.6730×10-6,148.1710×10-6,and125.3481×10-6 respectively. The concentration of antioxidants found in dry spacemen of calyces of Iraqi Hibiscus Sabdraffia Linn. under study: Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthoc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Proposed Study Unit Based on the Funds of Knowledge Theory in Developing the Attitudes Towards Cultural Identity and the Proposed Study Unit among Students of Basic Education in the Sultanate of Oman
...Show More Authors

The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2025
Journal Name
Al–bahith Al–a'alami
THE PREVAILING SCIENTIFIC VALUES IN CHILDREN'S PROGRAMS PROVIDED BY MBC3
...Show More Authors

The main problem of this research titled (the prevailing scientific values in children's programs provided by the channel (mbc3) is the disclosure of the scientific values that are included in the children's program in the mbc3 channel) which are directed to an important group of society, which is the category of children who spend long hours in front of TV screens to watch these programs, and therefore they acquire many values that can replace fixed values, such as social, moral, religious, etc., and the content analysis method has been used to analyze children's programs presented by mbc3 channel), and the research has reached a number of The results can be summarized b To come:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

View Publication
Scopus (87)
Crossref (85)
Scopus Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Effect of the Rapid Learning Method in Developing Creative Thinking Among Second-Grade Students in the Middle School in the Subject of History
...Show More Authors

The current research aims to examine the effect of the rapid learning method in developing creative thinking among second-grade female students in the subject of history. Thus, the researcher has adopted an experimental design of two groups to suit the nature of the research. The sample of the study consists of (36) randomly selected students from Al-Shafaq Secondary School for Women, which are divided randomly into two groups. The first group represents the experimental; it includes (31) students who studied the subject of history using the quick learning method. The second group, on the other hand, is the control group, which consists of (32) students, who studied the same subject using the traditional way. Before starting with the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF