Preferred Language
Articles
/
eBbfCocBVTCNdQwCSzIr
A strategy for Grid based t-way test data generation
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jan 07 2020
Journal Name
Xi,an University Of Architecture &technology
The Effect of Jigsaw strategy on Academic Achievement and Engagement in Learning among the 3rd male graders students in Chemistry
...Show More Authors

The research aims to identify the effect of jigsaw strategy in learning achievement and engaging for the third grade intermediate students in chemistry. The research sample consisted of (61) students distributed in two experimental and control groups. The research tools consisted in the achievement test and the measure of engaging learning. The results showed that there are statistically significant differences at the level of (α = 0.05) between the experimental group and the control group in both the achievement test and the measure of learning involvement for the benefit of the experimental group. In this light, the researcher recommended the use of jigsaw strategy for teaching the subject matter. Lamia because of its impact in raising

... Show More
Publication Date
Sun Sep 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Gas Lift for Improved Oil Recovery in a Middle East Field: A Genetic Algorithm Approach
...Show More Authors

This paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev

... Show More
View Publication
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A theoretical Design of a cover for lowering the solar cells temperature and enhance their performance
...Show More Authors

In this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Modified Organic Method for Preparation of Ibuprofen Microcapsules As a Sustained Release Solid Dosage Form
...Show More Authors

ABSTRACT:
Microencapsulation is used to modify and retard drug release as well as to overcome the unpleasant effect
(gastrointestinal disturbances) which are associated with repeated and overdose of ibuprofen per day.
So that, a newly developed method of microencapsulation was utilized (a modified organic method) through a
modification of aqueous colloidal polymer dispersion method using ethylcellulose and sodium alginate coating materials to
prepare a sustained release ibuprofen microcapsules.
The effect of core : wall ratio on the percent yield and encapsulation efficiency of prepared microcapsules was low, whereas
, the release of drug from prepared microcapsules was affected by core: wall ratio ,proportion of coa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Isa Transactions
Design of a Complex fractional Order PID controller for a First Order Plus Time Delay system
...Show More Authors

View Publication
Scopus (48)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More