Preferred Language
Articles
/
RheAmZIBVTCNdQwCm7nD
Comparison between (ARIMA) and (ANNs) models for estimating the relative humidity for Baghdad city
...Show More Authors

The aim of the research is to study the comparison between (ARIMA) Auto Regressive Integrated Moving Average and(ANNs) Artificial Neural Networks models and to select the best one for prediction the monthly relative humidity values depending upon the standard errors between estimated and observe values . It has been noted that both can be used for estimation and the best on among is (ANNs) as the values (MAE,RMSE, R2) is )0.036816,0.0466,0.91) respectively for the best formula for model (ARIMA) (6,0,2)(6,0,1) whereas the values of estimates relative to model (ANNs) for the best formula (5,5,1) is (0.0109, 0.0139 ,0.991) respectively. so that model (ANNs) is superior than (ARIMA) in a such evaluation.

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Comparative Study between Recycled Fine and Coarse Aggregate Used in Roller Compacted Concrete Pavement
...Show More Authors

To decrease the impact on the environment of building waste, the recycled aggregate may be used in various sustainable engineering applications, such as roller compacted concrete pavement (RCCP). This research examined how using recycled aggregate as a partial replacement for natural aggregate as coarse or fine affected the mechanical properties of roller-compacted concrete pavement. The recycled aggregate was crushed and sieved to coarse and fine aggregate before being used in the roller-compacted concrete pavement. Compressive strength, splitting tensile strength, and flexural strength were all evaluated after the samples were prepared at 28 and 90 days of curing. According to the study's findings, the partial replacem

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Foavedur mass media for children and modifyin Their behaviour from point of their parents view: Foavedur mass media for children and modifyin Their behaviour from point of their parents view
...Show More Authors

Abstract:
The research aimed to know favoured mass media for children and
modifying their behaviour ,the child became aquires the information from
mass media that he exposure them without any guidance , where upon the
quidance proqrammes becomes real danger whereas qet out their civil

style and converting to deadly poisons,and because of little study for this
supject the two researchers opined to perform astudy to know the favoured
mass media to the children and what are the mass media that modify their
behavior according to ther parent points of view ,after propring the research
measurement and the suilable statical methods it has shown that there are
mass media affect in children behavior ,they are st

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 05 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF CHEMICAL AND MICROBIAL QUALITY FOR SOME BOTTLED WATER THAT AVAIABLE IN LOCAL MARKETS: EVALUATION OF CHEMICAL AND MICROBIAL QUALITY FOR SOME BOTTLED WATER THAT AVAIABLE IN LOCAL MARKETS
...Show More Authors

This study was conducted to evaluate the bottled water quality for the six-producing companies in Baghdad city, where selected six brands which are the most marketed in the Iraqi market, especially in Baghdad, where taking the proper amount of bottled water in September 2015 and included the studied characteristics (EC , pH ,TDS, Turbidity, Ca+2, Mg+2, Cl-, No3-, So4-2, HCO3-, Na+ and K+) in addition to the total population of bacteria aerobic and coliform, and compare the results with the standard specifications of the Iraqi and the World Health Organization (WHO), as well as to compare the results of sampling specifications mentioned on the packaging by the producing companies. The results showed the presence of high significant differ

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN: EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN
...Show More Authors

ABSTRACT

The study aimed to evaluate the information label of some local pickle products and estimate sodium benzoate therein. 85 samples of locally made pickles were collected from Baghdad city markets and randomly from five different areas in Baghdad it included (Al-Shula, Al-Bayaa, Al-Nahrawan, Al-Taji, and Abu Ghraib), which were divided into groups P1, P2, P3, P4 and P5, respectively, according to those areas,  samples information label was scanned and compared with the Iraqi standard specification for the information card of packaged and canned food IQS 230, the results showed that 25.9% of the samples were devoid of the indication card informa

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Cutaneous leishmaniasis: Comparative Techniques for Diagnosis
...Show More Authors

AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14

View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The Sixth Conference Of The Faculty Of Languages
Utilizing Computers for Developing Students Skills
...Show More Authors

NAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010

View Publication