Preferred Language
Articles
/
IhYTGocBVTCNdQwCMjdB
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Using the foreign trade elasticities in policy of demand of imports of agricultural products in Iraq
...Show More Authors

Preview PDF
Scopus
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
“The impact of using the of the Government Finance Statistics Manual (GFSM) on The General Budget in Iraq”
...Show More Authors

This research is aiming  to analyze the impacts of the current budget in Iraq by using  the Government Finance Statistics Manual (GFSM) , the research is based on hypothesis: (There is an impact on the using of the Government Finance Statistics Manual (GFSM) In public budget in Iraq) .This hypothesis was demonstrated by using the questionnaire, a number of conclusions were reached, the most important being the lack of terminology adopted in the government accounting system and the Iraqi financial and accounting manual as a result of their adoption of the monetary basis for the lack of accounting terminology that meets t

... Show More
View Publication
Crossref
Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Evaluation of Shear Bond Strength of Sapphire Brackets after Dental Bleaching
...Show More Authors

Background: The present study was conducted to evaluate the effects of different bleaching methods on the shear bond strength of orthodontic Sapphire brackets bonded to human premolars teeth using light cured composite resin and to determine the predominant site of bond failure. Materials and Methods: Thirty freshly extracted human premolars were selected and randomly divided into three groups (10 per group). These groups are: control (unbleached) group, hydrogen peroxide group (HP) 37.5% ; which is the in- office bleaching method group, carbamide peroxide group (CP) 16%; which is the at- home bleaching method group. After bleaching process was performed, all the teeth stored in distilled water in a sealed container at room temperature for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 30 2020
Journal Name
Journal Of Sustainability Science And Management
THE DIFFERENTIATION IN WORK ENRICHMENT STRATEGIES AND ORGANIZATIONAL CREATIVITY FUNCTION: A PERSPECTIVE FROM THE LEADERS OF THE MINISTRY OF OIL IN IRAQ
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison of Parameters Estimation Methods for the Negative Binomial Regression Model under Multicollinearity Problem by Using Simulation
...Show More Authors

This study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 10 2021
Journal Name
Design Engineering
Lossy Image Compression Using Hybrid Deep Learning Autoencoder Based On kmean Clusteri
...Show More Authors

Image compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye

... Show More
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Advances In Information Technology
Towards Accurate SDG Research Categorization: A Hybrid Deep Learning Approach Using Scopus Metadata
...Show More Authors

The complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication