Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: II. Pairing and Exact Treatment
...Show More Authors

In an earlier paper, the basic analytical formula for particle-hole nuclear state densities was derived for non-Equidistant Spacing Model (non-ESM) approach. In this paper, an extension of the former equation was made to include pairing. Also a suggestion was made to derive the exact formula for the particle-hole state densities that depends exactly on Fermi energy and nuclear binding energies. The results indicated that the effects of pairing reduce the state density values, with similar dependence in the ESM system but with less strength. The results of the suggested exact formula indicated some modification from earlier non-ESM approximate treatment, on the cost of more calculation time

View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Engineering
Comparative Analysis of The Combined Model (Spatial and Temporal) and Regression Models for Predicting Murder Crime
...Show More Authors

This research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Assessing BIM Integration with Sustainable Requirement for Buildings Construction
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The effectiveness of internal and external auditing in support Corporate governance
...Show More Authors

The study aims at showing the active role of the internal auditors through explaining what they should be obliged to in writing the reports and financial and non financial statements according to the international standards of accounting to be transparent and integral. It also aims at giving the independence that the auditors should enjoy through connecting them to an Auditing Commissions to submit additional services in addition to assessing the instrument of control to evaluate risks, give consultations and the services related to the governance and independence of Supervising Council.                         

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Improving Nursing process Performance based on service scheduling dimensions. ( Field research)
...Show More Authors

Abstract :

This present paper sheds the light on dimensions of scheduling the service that includes( the easiness of performing the service, willingness , health factors, psychological sides, family matters ,diminishing the time of waiting that improve  performance of nursing process including ( the willingness of performance, the ability to perform  the performance , opportunity of performance) . There is genuine problem in the Iraqi hospitals  lying into the weakness of nursing staffs , no central decision to define and organize schedules. Thus the researcher has chosen  this problem as to be his  title . The research come a to develop  the nursing service

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Int. J. Mod. Eng. Res
Exact solutions for MHD flow of a viscoelastic fluid with the fractional Burgers’ model in an annular pipe
...Show More Authors

This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.

View Publication
Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Nasaq
A Semiotic Analysis Of Visual-Textual Elements In TobaccoFree Initiative 2021 Advertisements
...Show More Authors

The provided research paper offers a thorough analysis of the semiotic analysis present in tobacco-free initiative advertisements from the year 2021. The study delves into the intricate process of decoding the diverse signs, symbols, and visual components integrated into these anti-smoking campaigns. The core aim of this investigation is to comprehend and explore the semiotic tactics that underlie these advertisements, with a particular emphasis on visual communication as a pivotal tool in shaping the public's attitudes and behaviors towards tobacco usage. The research introduces a significant theoretical framework, the "Taxonomy of Image-Text Relations and Functions" theory, as proposed by Emily E. Marsh and Marilyn Dom

... Show More
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The stylistics of expressive structure in Al-Sayyab's attempt- A textual study
...Show More Authors

Our research tends to study the poetic attempt of  Badr Shakir Al-Sayyab and examine it stylistically, and we suggested his mature collection '' Rain song'' as a pattern for our textual analysis of the poet's attempt.

   In the beginning , we confirm that branches of applied structures meet to produce poetry such as narration , drama , cinema , mythology , allegory , various religious and historical texts , previous events , and special cumentary events related to work production. If all above-mentioned was complicated and disregarded throughout a single text , the text writer would not secure positive results that might keep open continuity between him and his readers.

   Therefore , this issue w

... Show More
View Publication Preview PDF