Preferred Language
Articles
/
8hdrsJIBVTCNdQwC3L1i
The Shift towards the Results-Oriented Budget and Its Impact on Government Performance Information
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Agricultural And Statistical Sciences
Effect of foliar spraying with gibberellic and humic acid on wheat growth
...Show More Authors

Scopus (8)
Scopus
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks
...Show More Authors

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Expert Systems With Applications
Combined influence of forearm orientation and muscular contraction on EMG pattern recognition
...Show More Authors

View Publication
Scopus (145)
Crossref (133)
Scopus Clarivate Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
A Framework of APT Detection Based on Packets Analysis and Host Destination
...Show More Authors

So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Eastern Mediterranean Health Journal
Knowledge and practices of women in Iraqi universities on breast self examination
...Show More Authors

This study evaluated the knowledge and practice of breast self-examination (BSE), among a sample of educated Iraqi women. The study sample comprised 858 women aged 18–62 years affiliated to 6 major Iraqi universities, categorized according to occupation as teaching staff (11.5%), administrative staff (18.0%) and students (70.5%). Data were collected by a self-completed questionnaire. In all, 93.9% of the women had heard about BSE, the main source of information was television (39.9%), doctors (18.4%) and the awareness campaign of the Iraqi National Breast Cancer Research Programme (11.6%). Only 53.9% of the women practised BSE; the most common excuses by those that did not were lack of knowledge of the significance of BSE (42.0%) and lack

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Adsorption Behavior of Light Naphtha Components on Zeolite (5A) and Activated Carbon
...Show More Authors

Light naphtha one of the products from distillation column in oil refineries used as feedstock for gasoline production. The major constituents of light naphtha are (Normal Paraffin, Isoparaffin, Naphthene, and Aromatic). In this paper, we used zeolite (5A) with uniform pores size (5Aº) to separate normal paraffin from light naphtha, due to suitable pore size for this process and compare the behavior of adsorption with activated carbon which has a wide range of pores size (micropores and mesopores) and high surface area. The process is done in a continuous system - Fixed bed reactor- at the vapor phase with the constant conditions of flow rate 5 ml/min, temperature 180oC, pressure 1.6 bar and 100-gram weight o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Implementation of Power System Stabilizer Based on Conventional and Fuzzy Logic Controllers
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.

 

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 18 2017
Journal Name
Transactions Of The Asabe
Effect of Drying Conditions on Triticale Seed Germination and Rice Weevil Infestation
...Show More Authors

The combination of high protein content and a soft seed coat makes the wheat-rye hybrid Triticale (Triticosecale) vulnerable to attack by rice weevils. Drying triticale grain to moisture contents safe for storage can prevent infestation by rice weevils, but if grain is being stored for seed, high drying temperatures can affect seed germination. Grain can be effectively dried at low temperatures, but low-temperature drying is difficult in hot, humid regions such as the Gulf Coast. This study nvestigated the effects of drying temperatures from 35°C to 45°C on triticale seed germination and found no statistical differences between the germination rates of the seed at any of the drying temperatures and the germination rates of controls. Final

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref