Preferred Language
Articles
/
_RYEwooBVTCNdQwCDaSu
Analytic view at alpha clustering in even-even heavy nuclei near magic numbers 82 and 126
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Pollution
Prediction of sediment heavy metal at the Australian Bays using newly developed hybrid artificial intelligence models
...Show More Authors

View Publication
Crossref (106)
Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
The pre-equilibrium and equilibrium double differential cross sections for the nucleons and light nuclei induce nuclear reactions on 27Al nuclei
...Show More Authors

The pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of higher Education Institutes in restricting Administrative and Financial Corruption: An Analytic Reading
...Show More Authors

Corruption, in all its categories and forms, is regarded as the nowadays virus which has greatly spread in most institutes and society, a matter that cause a great waste of resources.

      According to the reports of international transparency Institute, Iraq is regarded as one of the greatest countries in corruption.

      Regardless of the reasons and forms of corruption, the retreat in work – values and ethics are the main reasons behind that.

      Being the main source of providing qualified staff "educators" for the working market, the high education institutes face great challenges in standing against corruption inside and outside

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the orig

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Thu Mar 03 2022
Journal Name
Archives Of Rheumatology
Association of tumor necrosis factor-alpha promoter region gene polymorphism at positions -308G/A, -857C/T, and -863C/A with etanercept response in Iraqi rheumatoid arthritis patients
...Show More Authors

Objectives: This study aims to evaluate the association between polymorphisms in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at locations -308G/A, -857C/T, and -863C/A with the tendency of being non-responder to etanercept.

Patients and methods: Between October 2020 and August 2021, a total of 80 patients (10 males, 70 females; mean age: 50 years; range, 30 to 72 years) with rheumatoid arthritis (RA) receiving etanercept for at least six months were included. The patients were divided into two groups responders and non-responders, based on their response after six months of continuous treatment. Following polymerase chain reac

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Mass stopping power of alpha particles in liquid water and some gases
...Show More Authors

The interaction of charged particles with the chemical elements involved in the synthesis of human tissues is one of the modern techniques in radiation therapy. One of these charged particles are alpha particles, where recent studies have confirmed their ability to generate radiation in a highly toxic localized manner because of its high ionization and short its range. In this work, We focused our study on the interaction of alpha particles with liquid water; since the water represents over 80% of the most-soft tissues, as well as, hydrogen, oxygen, and nitrogen ,because they are key chemical elements involved in the synthesis of most human tissues. The mass stopping powers of alpha particle with HଶO , COଶ, Oଶ, Hଶ and Nଶhave

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref