Preferred Language
Articles
/
dxcHOI8BVTCNdQwCBWNa
Multi-Objective Evolutionary Algorithm Based on Decomposition for Energy Efficient Coverage in Wireless Sensor Networks
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Mono-Multi Vision and Its Relationship to Psychological Rebellion and Personality Traits of University Students
...Show More Authors

The current research seeks to identify mono-multi Vision and its relation to the psychological rebellion and personality traits of university students. To achieve this aim, the researcher has followed all the procedures of the descriptive correlational approach, as it is the closest approach to the objectives of the current research. The researcher has determined his research community for Baghdad University students for the academic year 2019-2020. As for the research sample, it was chosen by the random stratified method with a sample of (500) male and female students. In order to collect data from the research sample, the researcher adopted a mono-multi-dimensional scale

(Othman, 2007), the researcher designed a psychological r

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
2019 4th Scientific International Conference Najaf (sicn)
Modeling and Experimental Research of Vibration N Properties of A Multi-Layer Printed Circuit Board
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Iraqi Journal Of Biotechnology
Synergistic Effect of Conocarpus erectus Extract and some Antibiotics against Multi-Drug Resistant Pseudomonas aeruginosa
...Show More Authors

Over the past few decades, the health benefits are under threat as many commonly used antibiotics have become less and less effective against certain illnesses not only because many of them produce toxic reactions but also due to the emergence of drug-resistant bacteria. The clinical use of a combination of antibiotic therapy for Pseudomonas aeruginosa infections is probably more effective than monotherapy. The present study aims to estimate the antibacterial and antibiofilm activity of Conocarpus erectus leaves extracts against multi-drug resistant P. aeruginosa isolated from different hospitals in Baghdad city. One hundred fifty different clinical specimens were collected from patients from September 2021 to January 2022. All samples were

... Show More
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Gray-Scale Image Brightness/Contrast Enhancement with Multi-Model Histogram linear Contrast Stretching (MMHLCS) method
...Show More Authors

Gray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 5th International Conference On Information Systems Security And Privacy
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2019
Journal Name
International Journal Of Dynamics And Control
Biomechanics, actuation, and multi-level control strategies of power-augmentation lower extremity exoskeletons: an overview
...Show More Authors

View Publication
Scopus (31)
Crossref (30)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Heliyon
Stigma towards health care providers taking care of COVID-19 patients: A multi-country study
...Show More Authors

View Publication
Scopus (34)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More