Preferred Language
Articles
/
cxZIBocBVTCNdQwCKy8t
Lidar-Level Localization With Radar? The CFEAR Approach to Accurate, Fast, and Robust Large-Scale Radar Odometry in Diverse Environments
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Multi-level model of the factors that affect the escalation of dust in Iraq
...Show More Authors

In this research The study of Multi-level  model (partial pooling model) we consider The partial pooling model which is one Multi-level  models and one of  the Most important models and extensive use and application in the analysis of the data .This Model characterized by the fact that the treatments take hierarchical or structural Form, in this partial pooling models, Full Maximum likelihood FML was used to estimated parameters of partial pooling models (fixed and random ), comparison between the preference of these Models, The application was on the Suspended Dust data in Iraq, The data were for four and a half years .Eight stations were selected randomly  among the stations in Iraq. We use Akaik′s Informa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Multi-level model of the factors that affect the escalation of dust in Iraq
...Show More Authors

In this research The study of Multi-level  model (partial pooling model) we consider The partial pooling model which is one Multi-level  models and one of  the Most important models and extensive use and application in the analysis of the data .This Model characterized by the fact that the treatments take hierarchical or structural Form, in this partial pooling models, Full Maximum likelihood FML was used to estimated parameters of partial pooling models (fixed and random ), comparison between the preference of these Models, The application was on the Suspended Dust data in Iraq, The data were for four and a half years .Eight stations were selected randomly  among the stations in Iraq. We use Akaik′s Informa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 02 2009
Journal Name
Noise And Health
Expert system to predict effects of noise pollution on operators of power plant using neuro-fuzzy approach
...Show More Authors

Ration power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Alloys And Compounds
A holistic approach to optical characterizations of vacuum deposited Cu2ZnSnS4 thin film coatings for solar absorbing layers
...Show More Authors

View Publication
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 08 2025
Journal Name
Al.qadisiya Journal For The Sciences Of Physical Education
The Influence of Using Special Exercises with Weights to Develop Moments of Force to Some of the Striking Shoulder and Arm Muscles and Accuracy of the Skill of the Smash and Rectum in Volleyball
...Show More Authors

This research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force f

... Show More
View Publication
Publication Date
Tue Jan 02 2024
Journal Name
Turkish Archives Of Pediatrics
Evaluation of Decayed, Missing Due to Caries, and Filled Teeth Index in Children with Phenylketonuria in Comparison to Normal Population
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 08 2025
Journal Name
Al-fatih Journal
Impact exercises sense of the power arm in the level of performance skill in basketball clapotement
...Show More Authors

أن كرة السلة بما تتضمنه من مهارات حركية متنوعة تتطلب من ممارسيها امتلاك عدد من القدرات الحركية الخاصة وبشكل خاص التوافق العضلي العصبي والرشاقة والقوة المميزة بالسرعة، فضلاعن قدرات الإدراك الحس- حركي (إدراك المكان وقوة دفع الكرة سواء بالطبطبة العالية أو الواطئة .... الخ ) لذا تكمن أهمية البحث في إيجاد الطرق والوسائل التي تطور قدرة الطالبة على إدراك قوة دفع الكرة والإحساس بها أثناء تعلم وتدريب الطبطبة بأنواعها ب

... Show More
View Publication
Publication Date
Wed Jan 08 2025
Journal Name
Modern Sport
Precision tracking and visual animation and its relationship to the results of the competition with the Sabre Players.
...Show More Authors

In order to get advanced results, we must stand at the pointsthat have been observed by the trainers that are of significance inthe sport of fencing and concern for capacity optical (traceoptical and precision visual animation), so we must learn some ofthese types of capacity, whichever is more influential in the gamefencing so that they add a new axis to the player to pick andchoose in order to achieve the desired goal and raise the level ofthe game.The study aimed to identify the relationship between the visualtracking and accuracy of visual animated face and the results ofcompetitions Sabre of the other.Used a much more descriptive approach to study relational on asample of players clubs Sabre and the way intentional, whoqualified to the

... Show More
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref