Preferred Language
Articles
/
9hjNRZQBVTCNdQwCUQN5
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of X-Ray Effects on HF Radio Communications
...Show More Authors
Abstract<p>This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
SIMULATION MODEL FOR THE ASSESSMENT OF DIRECT AND INDIRECT GEOREFERENCING TECHNIQUES IN ANALYTICAL PHOTOGRAMMETRY
...Show More Authors

This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.

 

The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Health Assessment and unhealthy eating habits for children nurseries in the city of Baghdad
...Show More Authors

This study was conducted to identify the health status of children's nurseries in the city of Baghdad and to identify improper dietary habits practiced by these children have shown the results of this study that the same proportion of childhood diarrhea disease research and infections

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Using GPR Technique Assessment for Study the Sub-Grade of Asphalt and Concrete Conditions
...Show More Authors

The Ground Penetrating Radar (GPR) is frequently used in pavement engineering
for road pavement inspection. The main objective of this work is to validate
nondestructive, quick and powerful measurements using GPR for assessment of subgrade
and asphalt /concrete conditions. In the present study, two different antennas
(250, 500 MHz) were used. The case studies are presented was carried in University
of Baghdad over about 100m of paved road. After data acquisition and radar grams
collection, they have been processed using RadExplorer V1.4 software
implementing different filters with the most effective ones (time zero adjustment and
DC removal) in addition to other interpretation tool parameters.
The interpretatio

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
Simulation Model for the Assessment of Direct and Indirect Georeferencing Techniques in Analytical Photogrammetry
...Show More Authors

B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2

View Publication
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Nanostructural study of Ti-Ni binary alloy prepared by mechanical alloying
...Show More Authors

In the present study, a powder mixture of elements Ti and Ni was mechanically alloyed in a high energy ball mill. Microstructure of the nanosized amorphous milled product in different stages of milling has been characterized by X- ray diffraction, scanning electron microscopy and differential thermal analysis. We found that time of mechanical alloying is more significant to convert all crystalline structure to the amorphous phase. Nanocrystalline phase was achieved as a result of the mechanical alloying process. The results also indicates that the phase transformation and the grain size occurs in these alloys are controlled by ball milling time

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
New Method for Estimation Mebeverine Hydrochloride Drugs Preparation by a New Analyser: Ayah 6S.X1(WSLEDs)-T.- Two Solar Cells Complied with C.F.I.A
...Show More Authors

A sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source  with C.F.I.A.. The method was based on the formation  of  ion pair for the pinkish banana color  precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of   precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D%

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref