Preferred Language
Articles
/
VxfENY8BVTCNdQwCsmKB
Differential Evolution algorithm for linear frequency modulation radar signal denoising
...Show More Authors

Signal denoising is directly related to sample estimation of received signals, either by estimating the equation parameters for the target reflections or the surrounding noise and clutter accompanying the data of interest. Radar signals recorded using analogue or digital devices are not immune to noise. Random or white noise with no coherency is mainly produced in the form of random electrons, and caused by heat, environment, and stray circuitry loses. These factors influence the output signal voltage, thus creating detectable noise. Differential Evolution (DE) is an effectual, competent, and robust optimisation method used to solve different problems in the engineering and scientific domains, such as in signal processing. This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. The results gave high target recognition and showed feasibility to denoise received signals.

Scopus Crossref
View Publication
Publication Date
Sat Aug 15 2015
Journal Name
Iraqi Dental Journal
Standardized Protocol for Endodontic Treatment (Iraqi Endodontic Society)
...Show More Authors

The establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS
...Show More Authors

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Biochemical Characterization for Lipid Synthesis in Aspergillus niger
...Show More Authors

A niger, a fungus which doesn't have high ability to production lipid, this fungus has been select to investigate the non oleaginicity. In this search, there are explorations about: i) growth profile ii) enzymes profile iii) isoforms. Growth profile shows that this fungus doesn't have ability to accumulate lipid more than 6% while bio mass are around 10g/l in spite of the presence of glucose in the media till the end of cultivation time and excision of nitrogen within 24 hrs. In enzyme study, we investigate all lipogenic enzymes Malic enzyme (ME), Fatty acid synthase (FAS), ATP: Citrate lays (ACL), NAD+ isocitrate dehydrogenase (NAD+ICDH), Glucose-6-phosphate (G6PD), and 6-phosphogluconate dehydrogenase (6PGD), all these enzymes show, ac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Telecommunication, Electronic And Computer Engineering
The critical success factors (CSFs) for IT projects
...Show More Authors

Huge yearly investments were made by organizations for the development and maintenance. However, it has been reported that most of the IT projects fails as it is delayed, over budget and discontinued quality. A systematic literature review (SLR) was conducted to identify the critical success factors (CSFs) for the IT projects. Nine (9) CSFs was identified from the SLR. An online survey was conducted among 103 respondents from developers and IT managers. The data was analyzed using the Statistical Package for Social Science (SPSS 22). The findings showed that the highest CSFs of IT projects is commitment and motivation. Project monitoring was found the lowest score ranked by respondents.

Scopus (18)
Scopus
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Adaptive Smoothing Technique for Remotely Sensed Images Enhancement
...Show More Authors

Spatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.

View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Politics in Harold Pinter's One for the Road
...Show More Authors

Pinter's play One for the Road (1984) is considered one of his important plays because
it focuses on political issues, which he has not presented overtly before. Generally speaking,
Pinter's early plays describe man's existential fear of an unnamed danger which might be
represented by an intruder who invades the characters' solitude , threatens their peace, and
brings their hidden fears to the surface. Pinter began to write political plays as a result of his
political attitudes and his involvement in political activities over the last three decades.
Pinter's One for the Road deals with the oppressive and authoritarian operations of
state power. This play and Pinter's political plays which followed it, like Mountain

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Modeling and Simulating NOMA Performance for Next Generations
...Show More Authors

Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Governance work guidance for financial and institutional reform
...Show More Authors

There has been increase in banks and financial institutions interest in governance topic, as it focused all it attention on this topic specially after the growing role and massive expansion of the private sector in economic life , this sector become vital and important and basic role in growth and developing countries economy that’s why there been increase interest in governance and its mechanism , using this mechanism ( board of directors mechanism , ownership concentration mechanism , financial compensation mechanism, minimum rate of capital mechanism) who would adjust and guide the path and orientation of banks and financial institutions as to ensure the  achievement of their goals and mission of their desired within th

... Show More
View Publication Preview PDF
Crossref