Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Applying some hybrid models for modeling bivariate time series assuming different distributions for random error with a practical application
...Show More Authors

Abstract

  Bivariate time series modeling and forecasting have become a promising field of applied studies in recent times. For this purpose, the Linear Autoregressive Moving Average with exogenous variable ARMAX model is the most widely used technique over the past few years in modeling and forecasting this type of data. The most important assumptions of this model are linearity and homogenous for random error variance of the appropriate model. In practice, these two assumptions are often violated, so the Generalized Autoregressive Conditional Heteroscedasticity (ARCH) and (GARCH) with exogenous varia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2019
Journal Name
National Academy Science Letters
The Detection Limit of PCR Amplification for Cryptosporidium spp. Oocysts in Fecal Samples
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Gel clot assay used for detection of candida spp onfection in urinary tract
...Show More Authors

the study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital

View Publication Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Construction of a Robust Background Model for Moving Object Detection in Video Sequence
...Show More Authors

Background Subtraction (BGS) is one of the main techniques used for moving object detection which further utilized in video analysis, especially in video surveillance systems. Practically, acquiring a robust background (reference) image is a real challenge due to the dynamic change in the scene. Hence, a key point to BGS is background modeling, in which a model is built and repeatedly used to reconstruct the background image.

From N frames the proposed method store N pixels at location(x,y) in a buffer, then it classify pixel intensity values at that buffer using a proposed online clustering model based on the idea of relative  run length, the cluster center with the highest frequency will be adopted as the background pixel

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences 318, 03006 (2021)
Effect of External Post-Tensioning Strengthening Technique on Flexural Capacity of Simple Supported Composite Castellated Beam
...Show More Authors

This research is carried out to study the effect of the external post-tensioning technique on the flexural capacity of simply supported composite castellated beam experimentally. In this research, seven composite castellated beams having the same dimensions and material properties were cast and tested up to failure by applied two concentrated loads at 700 mm from each end. Two external strands of 12.7 mm diameter were fixed at each side of the web of strengthening beams and located at depth 180 mm from top fiber of the section (dps) at each end of the beam. The strands have been tensioned by using a hydraulic jack with a constant stress of 100 MPa. This research aims to study the effect of the strengthening by different shapes of st

... Show More
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Pairwise Regularity and Normality Separation Axioms in C ̌ech Fuzzy Soft Bi-Closure Spaces
...Show More Authors

    In this paper, some new types of regularity axioms, namely pairwise quasi-regular, pairwise semi-regular, pairwise pseudo regular and pairwise regular are defined and studied in both ech fuzzy soft bi-closure spaces (  bicsp’s) and their induced fuzzy soft bitopological spaces. We also study the relationships between them. We show that in all these types of axioms, the hereditary property is satisfied under closed fs bi-csubsp of . Furthermore, we define some normality axioms, namely pairwise semi-normal, pairwise pseudo normal, pairwise normal and pairwise completely normal in both  bicsp’s and their induced fuzzy soft bitopological spaces, as well as their basic properties and the relationships between them are studied.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The impact of the Turkish intervention in northern Syria on the Syrian Turkish relations during (2011-2019)
...Show More Authors

This study aimed to provide a theoretical framework for the impact of the Turkish intervention in northern Syria and the extent of its impact on the relations between the two countries.

It also sought to answer the study's main question: What is the impact of the Turkish intervention in northern Syria on Turkish-Syrian relations during the period 2011-2019 ?.   

In this study, the historical method, the descriptive method, and the systems analysis method were used, with the aim of arriving at an accurate and realistic understanding of the Turkish-Syrian relations.

The study reached a set of results, the most important of which was that the Syrian-Turkish relations are based on interests, and that all alliances and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 16 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Statistic Assessment of Spreading Cases (Total Confirmed, Recovered, Death) From Different AreasContain Novel Coronavirus (2019-n Cov)
...Show More Authors

View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Sensors
On-Board Digital Twin Based on Impedance and Model Predictive Control for Aerial Robot Grasping
...Show More Authors

Aerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance control of the aerial payload transmission process. The impedance control technique is implemented to develop the target impedance based on emerging the mass of the payload and the model of the gripper fingers. Tracking the position of the interactional point between the fingers of gripper and payload, inside the impedance control, is achieved using model predictive control (MPD) approach.

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref