Preferred Language
Articles
/
fhYUVocBVTCNdQwCBkYK
Prediction of pore and fracture pressure using well logs in Mishrif reservoir in an Iraqi oilfield
...Show More Authors

Crossref
View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Mechanical Science And Technology
Damage detection in glass/epoxy composite structure using 8–12 GHz X-band
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Urinary Tract Stones Fragmentation using (2100 nm) Holmium: YAG Laser: (In vitro Analysis)
...Show More Authors

Urinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sat Sep 01 2018
Journal Name
2018 15th European Radar Conference (eurad)
Delamination Detection in Glass-Fibre Reinforced Polymer (GFRP) Using Microwave Time Domain Reflectometry
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Management by roaming and self-efficacy and their impact on the excellence of hotel service: An applied study
...Show More Authors

      This research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through  A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes   12   questions to measure the excellence of the hotel service. The research sample included  43  employees' responding to this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Pragmatic Presupposition: An ExtraLinguisitic Concept
...Show More Authors

Presupposition, which indicates a prior assumption, is a vital notion in both semantic and pragmatic disciplines. It refers to assumptions implicitly made by interlocutors, which are necessary for the correct interpretation of an utterance. Although there is a general agreement that presupposition is a universal property of Language, there are various propositions concerning its nature. However, this research work proposes that presupposition is a contextual term, thus, is more pragmatic than semantic in its nature.Although Semantics and Pragmatics are two distinct disciplines, they are interrelated and complementary to each other, since meaning proper involves both, and since there is no clear borderline between the two disciplines. How

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Energy And Buildings
Year-round performance evaluation of photovoltaic-thermal collector with nano-modified phase-change material for building application in an arid desert climate zone
...Show More Authors

View Publication
Scopus (19)
Crossref (21)
Scopus Clarivate Crossref