Preferred Language
Articles
/
bsj-853
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Optik
Ag2S/ZnO Nanorods Composite Photoelectrode Prepared by Hydrothermal Method: Influence of Growth Temperature
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Neural Network in the Identification of the Cumulative Production from AB unit in Main pays Reservoir of South Rumaila Oil Field.
...Show More Authors

A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited g

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Phytochemical investigation And high performance thin layer chromatography (HPTLC) identification of flavonoids and phenolic acids in Euphorbia cyathophora (Family: Euphorbiaceae) cultivated in Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Baghdad Science Journal
Isolation and identification of the Myxobacterium Myxococcus fulvus from the Farms and study the inhibitory effect of cells and filtrates against pathogenic fungi
...Show More Authors

The study was performed to isolate and identify the Myxococcus fulvus from the one hundred samples of soils of farms. Special growth conditions had been used to support the growth of M.fulvus local isolates and suppressed the growth of other microorganisms like (Drying , High Temperature , High concentration of antibiotics and specific growth media ) M.fulvus isolates had been subjected to the morphological, cultural , biochemical examination for identification , as well as , study the inhibitory activites of cells and filtrates of localized isolates against some pathogenic fungi include (Trichophyton mentagrophytes , Microsporum gypseum , Aspergillus niger and Fusarium oxyporum ) by using three methods :- Cup assay , well diffusio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 10 2020
Journal Name
Annals Of Tropical Medicine & Public Health
EFFECT OF EUCALYPTUS AND MYRTUS EXTRACTS IDENTIFICATION BY GAS CHROMATOGRAPHY-MASS SPECTROMETRY ON SOME SPECIES OF CANDIDA AS A MODEL OF MEDICAL PLANTS
...Show More Authors

The study showed that all extracts (aqueous, ethanolic and acetonic) of the leaves of Eucalyptus and Myrtus plants had a inhibitory effect on the growth of all types of yeasts studied, acetone extract recorded the highest inhibition of yeastat 100ppm concentration,The inhibition was 35mm, 34mm, 24mm and 20mm for Candida parapsilosis, Candida glabrata, Candida tropicalis and Candida albicans respectively, The experiments above showed the least significant differences at 0.05 level.The results ofE. Cammldulensis ethanolic tincture analysis has shown the presence of 44 biologically active substances. The main Eucalyptus leaves component was: 2-Bicyclo (2-2.1) heptanol (12.37%), Ledol (8.23%),1,2,4- Benzenetriol (8.45%) and that contain spathul

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
EFFECT OF EUCALYPTUS AND MYRTUS EXTRACTS IDENTIFICATION BY GAS CHROMATOGRAPHY-MASS SPECTROMETRY ON SOME SPECIES OF CANDIDA AS A MODEL OF MEDICAL PLANTS
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Knowledge Management System Requirements According to ISO 30401
...Show More Authors

This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r

... Show More
View Publication
Crossref