Preferred Language
Articles
/
PhdIT48BVTCNdQwCh2vY
Study of linear shrinkage for siliceous materials to meet insulating requirements
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 02 2021
Journal Name
Psychology And Education Journal
References for Receiving Explicit and Implicit Knowledge in the Holy Quran
...Show More Authors

The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between tw

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 28 2023
Journal Name
Surgical Neurology International
Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Computer Science
VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY
...Show More Authors

In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Wind Interference Effect for Overall Design Load on Mid-Rise Building
...Show More Authors

The constructed building in the urban area is subject to wind characteristics due to the influence of surrounding buildings. The residential complexes currently being built in Iraq represent a case study for the subject of this research. Therefore, the objective of this study is to identify the interference effect because of adjacent buildings effects on the mid-rise building. The speed and pressure of the wind have been numerically simulated as well as wind load has been simulated by using a virtual wind tunnel which is available in Autodesk Robot Structural Analysis, RSA, software. Two identical adjacent buildings have been simulated and many coefficients were included in this study such as the spacing, directionality,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 07 2025
Journal Name
Journal Of Physical Education
Constructing and Standardizing Physical Tests for Speed Endurance In Youth Basketball
...Show More Authors

View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Geological Journal
3D Geological Model for Zubair Reservoir in Abu-Amood Oil Field
...Show More Authors

The Zubair reservoir in the Abu-Amood field is considered a shaly sand reservoir in the south of Iraq. The geological model is created for identifying the facies, distributing the petrophysical properties and estimating the volume of hydrocarbon in place. When the data processing by Interactive Petrophysics (IP) software is completed and estimated the permeability reservoir by using the hydraulic unit method then, three main steps are applied to build the geological model, begins with creating a structural, facies and property models. five zones the reservoirs were divided (three reservoir units and two cap rocks) depending on the variation of petrophysical properties (porosity and permeability) that results from IP software interpr

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
2018 2nd International Conference On Imaging, Signal Processing And Communication (icispc)
Analogy-based Common-Sense Knowledge for Opinion-Target Identification and Aggregation
...Show More Authors

The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesized 2nd Generation Zeolite as an Acid-Catalyst for Esterification Reaction
...Show More Authors

MCM-48 zeolites have unique properties from the surfaces and structure point of view as it’s shown in the results ,and unique and very sensitive to be prepared, have been experimentally prepared and utilized as a second-generation/ acid - catalyst for esterification reactions of oleic acid as a model oil for a free fatty acid source with Ethanol. The characterization of the catalyst used in the reaction has been identified by various methods indicating the prepared MCM-48 is highly matching the profile of common commercial MCM-48 zeolite. The XRF results show domination of SiO2 on the chemical structure with 99.1% and  agreeable with the expected from MCM-48 for it's of silica-based, and the SEM results show the cubic c

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More