Preferred Language
Articles
/
Ghdjw44BVTCNdQwC9Fia
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The Similarity in the Holy Quran
...Show More Authors

The method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analyzing Laser Speckle Pattern Using the Discrete Cosine Transform
...Show More Authors

The use of Cosine transform to analyze the model-noise pattern alteration with different vibration model applied on multimode fiber optics are studied. It's results compared with the Fourier transform to perform the same analysis using total frequency difference and the computation time, which almost coincide for the both transforms. A discussion for the results and recommendation are introduced.

View Publication Preview PDF
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Image Mosaics Using Digital Cosine Transform (DCT) Descriptor
...Show More Authors

In this research work, a modified DCT descriptor are presented to mosaics the satellite images based on Abdul Kareem [1] similarity criterion are presented, new method which is proposed to speed up the mosaics process is presented. The results of applying the modified DCT descriptor are compared with the mosaics method using RMSE similarity criterion which prove that the modified DCT descriptor to be fast and accurate mosaics method.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The principals and techniques of geography text book for fourth secondary: The principals and techniques of geography text book for fourth secondary
...Show More Authors

Abstract
The curriculum is the major effective tool in achieving the goals of
education and society.

Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrang

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
New vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
...Show More Authors

New vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents

View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Occurrence of Pneumococcal Meningitis in Iraq
...Show More Authors

This study focuses on the relative frequency of Streptococcus pneumoniae in children with culture-proven bacterial meningitis. The epidemiology has been investigated with clinical and laboratory findings in The Central Public Health Laboratory, Iraq from April to September, 2010. From (138) samples , (55) cases (39.85 %) were diagnosed by physician as bacterial meningitis, (23) cases (16.66 %) as viral menginitis , (18) cases (13.04 %) as different medical cases (e.g febrile convulsion , meningoencephalitis , epilepsy …etc) and (42) cases (30.43 %) as unidentified medical cases. For bacterial meningitis S.pneumoniae was isolated from (10) cases (18.18 %) only. The median age for bacterial meningitis was (130.75) month and the predomina

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Nov 15 2021
Journal Name
2021 Third International Sustainability And Resilience Conference: Climate Change
Biodiversity and occurrence of plant viruses over four decades: Case study for Iraq
...Show More Authors

View Publication
Scopus (10)
Crossref (2)
Scopus Crossref