Preferred Language
Articles
/
JhbgQIcBVTCNdQwCKT6P
Evolutionary Feature Optimization for Plant Leaf Disease Detection by Deep Neural Networks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
First Record of Mint Leaf Beetle, Chrysolina herbacea (Duftschmid, 1825), (Coleoptera: Chrysomelidae) in Iraq
...Show More Authors

The  insect is diagnosed and named by the National Center of Biotechnology Information (NCBI), USA as the Mint leaf Beetle Chrysolina herbacea alnadawi (Duftschmid, 1825), (Coleoptera: Chrysomelidae). The diagnosis was performed depending on the DNA analysis by 73% similarity with Chrysolina herbacea (Duftschmid, 1825) sequence, In the present study. It is recorded as a new insect pest on mint plant Mentha  puleguim (L,1753) (Lamiaceae). DNA analysis confirmend that it is recorded for the first time in Iraq and the Arab world as well as the Middle East. Those insects were observed initially during August 2017 in residential gardens of Al-Bonooq district in Baghdad / Iraq.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Gsc Biological And Pharmaceutical Sciences
Survey and revision of leaf miners to some plants from different localities of Iraq
...Show More Authors

Publication Date
Thu Jul 01 1999
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
Records of some leaf miners of Anthomylidae, (Diptera) and their host plants in Iraq
...Show More Authors

The leaf miners Pegoinya terbrans (Rondani) and P. bicolor (Wiedemann) (Diptera; Anthomyiidae) were newly recorded in Iraq. Host plants of these leaf miners and P. cunicularia (Rondani) were identified: P. bicolor was found to be monophagous, whereas P. terbrans and P. cunicularia were oligophagous . It was found that Cirsixim syriaca and Silybum marianum were more susceptible to P. terbrans than the other ones. Infectivity and severity of infestation were estimated for most susceptible weeds against P. terbrans and P.bicolor. These leaf miners. Have two generations a year.

View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
International Review Of Electrical Engineering (iree)
Enhancing Efficiency in Distribution Power Networks by Power Factor Controlling of Renewable Energy Generators: a Case Study of Iraqi Wasit Network
...Show More Authors

Integrating Renewable Energy (RE) into Distribution Power Networks (DPNs) is a choice for efficient and sustainable electricity. Controlling the power factor of these sources is one of the techniques employed to manage the power loss of the grid. Capacitor banks have been employed to control phantom power, improving voltage and reducing power losses for several decades. The voltage sag and the significant power losses in the Iraqi DPN make it good evidence to be a case study proving the efficiency enhancement by adjusting the RE power factor. Therefore, this paper studies a part of the Iraqi network in a windy and sunny region, the Badra-Zurbatya-11 kV feeder, in the Wasit governorate. A substation of hybrid RE sources is connected to this

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust Optimization with practical application
...Show More Authors

The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values ​​of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Well placement optimization: A review
...Show More Authors

Optimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati

... Show More
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Gas lift optimization: A review
...Show More Authors

Optimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura

... Show More
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Iraqi Journal Of Science
New Weighted Synthetic Oversampling Method for Improving Credit Card Fraud Detection
...Show More Authors

The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More