Preferred Language
Articles
/
Dhdaw44BVTCNdQwCOVhk
A hybrid feature selection technique using chi-square with genetic algorithm
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Identify and Diagnose the Causes of Financial Funding using the Root Cause Analysis Technique
...Show More Authors

The analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 02 2021
Journal Name
Iraqi Journal Of Science
Mapping Land Cover/Land Use for Change Derivation Using Remote Sensing and GIS Technique
...Show More Authors

    Deriving land cover information from satellite data is one of the most common applications employed to monitor, evaluate, and manage the environment. This study aims to detect the land cover/land use changes and calculate the areas of different land cover types in Baghdad, Iraq, for the period from 2015 to 2020, using Landsat 8 images. The supervised Maximum Likelihood Classification (MLC) method was applied to classify the images. Four land cover types were obtained, namely urban, vegetation, water, and barren soil.  Changes in the four land cover classes during the study period were observed. The extent of the urban, vegetation, and water areas was increased by about 7.5%, 9.5%, and 1.5%, respectively, whereas t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics
Optical, Structural, Morphological Properties of Chromium (III) Oxide Nanostructure Synthesized Using Spray Pyrolysis Technique
...Show More Authors

Nanostructure of chromium oxide (Cr2O3-NPs) with rhombohedral structure were successfully prepared by spray pyrolysis technique using Aqueous solution of Chromium (III) chloride CrCl3 as solution. The films were deposited on glass substrates heated to 450°C using X-ray diffraction (XRD) shows the nature of polycrystalline samples. The calculated lattice constant value for the grown Cr2O3 nanostructures is a = b = 4.959 Å & c = 13.594 Å and the average crystallize size (46.3-55.6) nm calculated from diffraction peaks, Spectral analysis revealed FTIR peak characteristic vibrations of Cr-O Extended and Two sharp peaks present at 630 and 578 cm-1 attributed to Cr-O “stretching

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 05 2016
Journal Name
Iraqi Journal Of Science
Local Study of blaCTX-M genes detection in Proteus spp. by using PCR technique
...Show More Authors

n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Modeling of Electromembrane Extraction of Copper using a Novel Electrolytic Cell Provided with a Supported Liquid Membrane
...Show More Authors

   The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Software & Hardware Research In Engineering
Frontal Facial Image Compression of Hybrid Base
...Show More Authors

Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study of charge density distributions, elastic charge form factors and root-mean square radii for 4He, 12C and 16O nuclei using Woods- Saxon and harmonic-oscillator potentials
...Show More Authors

The nuclear charge density distributions, form factors and
corresponding proton, charge, neutron, and matter root mean square
radii for stable 4He, 12C, and 16O nuclei have been calculated using
single-particle radial wave functions of Woods-Saxon potential and
harmonic-oscillator potential for comparison. The calculations for the
ground charge density distributions using the Woods-Saxon potential
show good agreement with experimental data for 4He nucleus while
the results for 12C and 16O nuclei are better in harmonic-oscillator
potential. The calculated elastic charge form factors in Woods-Saxon
potential are better than the results of harmonic-oscillator potential.
Finally, the calculated root mean square

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref