Preferred Language
Articles
/
XRZgsYoBVTCNdQwCY6P_
Integration of extreme gradient boosting feature selection approach with machine learning models: application of weather relative humidity prediction
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Dual Stages of Speech Enhancement Algorithm Based on Super Gaussian Speech Models
...Show More Authors

Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Vertical Accuracy of Digital Elevation Models Based on Differential Global Positioning System
...Show More Authors

The Digital Elevation Model (DEM) has been known as a quantitative description of the surface of the Earth, which provides essential information about the terrain. DEMs are significant information sources for a number of practical applications that need surface elevation data. The open-source DEM datasets, such as the Advanced Space-borne Thermal Emission and Reflection Radiometer (ASTER), the Shuttle Radar Topography Mission (SRTM), and the Advanced Land Observing Satellite (ALOS) usually have approximately low accuracy and coarser resolution. The errors in many datasets of DEMs have already been generally examined for their importance, where their quality could be affected within different aspects, including the types of sensors, algor

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Fuzzy Entropy in Adaptive Fuzzy Weighted Linear Regression Analysis with Application to Estimate Infant Mortality Rate
...Show More Authors

An adaptive fuzzy weighted linear regression model in which the output is based
on the position and entropy of quadruple fuzzy numbers had dealt with. The solution
of the adaptive models is established in terms of the iterative fuzzy least squares by
introducing a new suitable metric which takes into account the types of the influence
of different imprecisions. Furthermore, the applicability of the model is made by
attempting to estimate the fuzzy infant mortality rate in Iraq using a selective set of
inputs.

View Publication Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Restricted Least Squares Method to Estimate and Analyze the Cobb-Douglas Production Function with Application
...Show More Authors

  In this paper, the restricted least squares method is employed to estimate the parameters of the Cobb-Douglas production function and then analyze and interprete the results obtained.         A practical application is performed on the state company for leather industries in Iraq for the period (1990-2010).         The statistical program SPSS is used to perform the required calculations.

View Publication Preview PDF
Publication Date
Fri Apr 16 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Reflexive Learning Strategy On Mathematics Achievement By First Intermediate Class Students And Their Attitudes Towards E-Learning
...Show More Authors

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A Study of the Problems of Learning and Translating Idioms
...Show More Authors

Idioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Narrative infrastructure and its impact on building open and closed endings in the feature film
...Show More Authors

The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref