Preferred Language
Articles
/
f4b_s4QBIXToZYALfkiS
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 14 2011
Journal Name
Journal Of Faculty Of Medicine Baghdad
The correlation between FEV1/ FVC with Arm span to height or chest to waist ratio as an index of pulmonary function in healthy subject.
...Show More Authors

Abstract

Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Analysis of the Content of the Computer Textbook for the Second Intermediate Grade According to Scientific and Moral Values
...Show More Authors

The purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:

 What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)? 

In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 25 2016
Journal Name
International Journal Of Mathematics Trends And Technology
Pretest Single Stage Shrinkage Estimator for the Shape Parameter of the Power Function Distribution
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Orthogonality of generalized G-m-derivations in semi-prime G-nearrings
...Show More Authors

We introduced the nomenclature of orthogonal G -m-derivations and orthogonal generalized G -m-derivations in semi-prime G -near-rings and provide a few essentials and enough provision for generalized G -n-derivations in semi-prime G -near-rings by orthogonal.

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref