Preferred Language
Articles
/
bsj-2428
Revaluation of Student Failure Reasons Using Non-Additive Methods
...Show More Authors

In this paper, An application of non-additive measures for re-evaluating the degree of importance of some student failure reasons has been discussed. We apply non-additive fuzzy integral model (Sugeno, Shilkret and Choquet) integrals for some expected factors which effect student examination performance for different students' cases.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Statistical Equations to Estimate the In-situ Concrete Compressive Strength from Non-destructive Tests
...Show More Authors

The aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Non-Linear Behavior of Strengthened Steel-Concrete Composite Beams with Partial Interaction of Shear Connectors
...Show More Authors

In this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The history of non-fungible crypto tokens (NFTs) art In the Kingdom of Saudi Arabia
...Show More Authors

This research is concerned with documenting and chronicling the art of NFTs art in the Saudi artistic cultural scene, the importance of which stems from the lack of scientific sources that document this field until the preparation of this research and aims to trace historically the emergence of the field of NFTs art in the Kingdom of Saudi Arabia in the arts sector through the experiences of Saudi artists. The most prominent events for the culture, arts and technology sector, and other Saudi sectors. The research dealt with the history of the emergence of the field of NFTs art, which extends from the history of digital arts, and reviewed the most famous works of NFTs art.
As a result of the technical revolution and the artistic move

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 11 2025
Journal Name
Discover Oncology
The role of non-coding RNAs in the regulation of cell death pathways in melanoma
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Extraction of Essential Oil from Iraqi Eucalyptus Camadulensis Leaves by Water Distillation Methods
...Show More Authors

The extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100 C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6: 1 ml: g amount of water to eucalyptus leaves Ratio.

Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 07 2025
Journal Name
Journal Of Image And Graphics
Analysis Evolution of Image Caption Techniques: Combining Conventional and Modern Methods for Improvement
...Show More Authors

This study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Women's knowledge about Family Planning Methods at Omer Sawi Teaching Hospital
...Show More Authors

Objectives:This study aimed to identify women perception and experience regarding family planning(FP) methods

 Methodology:Descriptive cross-sectional hospital based study,was conducted at Omer Sawi teaching hospital,from august to September 2019.Sample of 320 women, were selected randomly after their agreement.Data were collected through interview questionnaire and analyzed using a statistical package for social sciences (SPSS)and descriptive and inferential statistical methods were used.With accepted P.< 0.05.for the correlation significant. 

Results:Age group between 21-25 years represent (53.1%),most common education levels were secondary school 56%.Majority of women had 2-5 children.Half of the wo

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref