Preferred Language
Articles
/
9hjNRZQBVTCNdQwCUQN5
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS
...Show More Authors
Abstract<p>With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit bank credit risk in accordance with international auditing standards: Applied research at Rafidain Bank, Public Administration - Baghdad
...Show More Authors

This research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of the Risk Factors of Coronary Artery Diseases in Al-Nasiriyah City
...Show More Authors

Objective: to assess the risk factors of coronary artery disease patients.
Methodology: A non-probability (purposive) sample of (100) patients. The study population consisted of
a sample of adults from both genders whose ages were 30 years and more, and was newly diagnosed as
having CAD by coronary angiography in the cardiac catheterization unit of An Nasiriyah heart center.
Results: The result of the study showed that the most common modifiable risk factors were low HDL-C
levels (58%), smoking (53%), hypertension (46%), diabetes mellitus (34%), obesity (30%), high
triglycerides (19%), hypercholesterolemia (17%), and high LDLC (14%). All these factors were positively
and significantly associated with the development

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Room temperature flexible sensor based on F-MWCNT modified by polypyrrole conductive polymer for NO2 gas detection
...Show More Authors

This project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Acta Facultatis Medicae Naissensis
Asthma as a risk factor for The progression of COVID-19
...Show More Authors

Background: Asthma is one of the most common chronic respiratory diseases in the world, standing for the most frequent cause for hospitalization and emergency cases. Respiratory viruses are the most triggering cause. Aim: To assess the role of viral infections, especially COVID-19, in the pathogenesis of asthma initiation and exacerbations. Method: Electronic search was done for the manuscripts focusing on asthma as a risk factor for complications after COVID-19 infection. The outcomes were titles, materials, methods and classified studies related or not related to the review study. Three hundred publications were identified and only ten studies were selected for analysis. Seven studies were review, one retrospective, one longitudin

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (1)
Scopus Crossref