Preferred Language
Articles
/
iBcoWZABVTCNdQwCJ4e-
Echo Amplitude Normalization of Full-Waveform Airborne Laser Scanning Data Based on Robust Incidence Angle Estimation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Oct 05 2016
Journal Name
Anbar Journal Of Agricultural Sciences
Estimation of genetic parameters in cowpea
...Show More Authors

An experiment was carried out in the fields of Agriculture College-Baghdad University during spring and autumn of 2015 by using a randomized complete blocks design with three replications. The first season hybridization was established among three pure cultivars of cowpea (Vigna uniguiculata L.) which: Ramshorn, California black eye and Rahawya in full diallel crosses according to Griffing with first method and fixed model (3 parents+ 3 diallel hybrids +3 reciprocal hybrids) and a comparison experiment was in autumn season. The result of statistical analysis showed that there was a significant difference among the parents and their hybrids for all the studied characters. The parent 1 was the higher for root nodules number , leaf number, pod

... Show More
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Robust Circular S and Circular Least Squares Estimators for Circular Regression Model using Simulation
...Show More Authors

In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Isa Transactions
Robust adaptive active disturbance rejection control of an electric furnace using additional continuous sliding mode component
...Show More Authors

The temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Science
Estimation of Average of Global Solar Radiation Depending on Sunshine Duration Hours for Iraqi Metrological Stations
...Show More Authors

In this study, the global solar radiation for the locations of fourteen Iraqi metrological stations was studied and calculated. This was performed because most of the Iraqi stations lack solar radiation measuring devices. The equation postulated by Angström (1924) and modified by Prescott (1940) was utilized for the estimation of the solar radiation for the fourteen Iraqi metrological stations depending on sunshine duration measurements of these stations. Empirical constants of Angstrom-Prescott equation that are adopted by the Food and Agriculture Organization (FAO) were used for obtaining the results. The utilized data reported in this study were taken from the Republic of Iraq Meteorological Office (RIMO). The calculations and diag

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Jan 22 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref