Preferred Language
Articles
/
iBfgNY8BVTCNdQwCQmJX
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jul 14 2025
Journal Name
Wasit Journal Of Sports Sciences
The impact of the Needham model on learning the skills of dribbling and handling in football for students
...Show More Authors

View Publication
Publication Date
Mon Jul 14 2025
Journal Name
Journal Of Physical Education
The effect of the Perkins-Blyth model on learning some compound skills in soccer for second intermediate students
...Show More Authors

View Publication
Publication Date
Wed May 04 2016
Journal Name
Journal Of Sport Sciences
The Effect of Competitive Learning Strategy in Developing Mental visualization of some Basic Skills in Basketball for Students
...Show More Authors

IRA Dawood, JOURNAL OF SPORT SCIENCES, 2016 - Cited by 3

View Publication
Publication Date
Fri Aug 13 2021
Journal Name
Neural Computing And Applications
Integration of extreme gradient boosting feature selection approach with machine learning models: application of weather relative humidity prediction
...Show More Authors

View Publication
Scopus (62)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Wed Nov 25 2020
Journal Name
Plos One
Impact of the COVID-19 pandemic on medical education: Medical students’ knowledge, attitudes, and practices regarding electronic learning
...Show More Authors

The Coronavirus Disease 2019 (COVID-19) pandemic has caused an unprecedented disruption in medical education and healthcare systems worldwide. The disease can cause life-threatening conditions and it presents challenges for medical education, as instructors must deliver lectures safely, while ensuring the integrity and continuity of the medical education process. It is therefore important to assess the usability of online learning methods, and to determine their feasibility and adequacy for medical students. We aimed to provide an overview of the situation experienced by medical students during the COVID-19 pandemic, and to determine the knowledge, attitudes, and practices of medical students regarding electronic medical education.

... Show More
View Publication
Scopus (437)
Crossref (446)
Scopus Clarivate Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Hemoptysis Hospital Based Study, At AL- Kindy Teaching Hospital
...Show More Authors

Background: Expectoration of blood that originated in the lungs or bronchial tubes is a frightening symptom for patients and often is a manifestation of significant and possibly dangerous underlying disease. Tuberculosis was and still one of the common causes followed by bronchiactasis , bronchitis, and lung cancer. Objectives: The aim of this study is to find the frequency of causes of respiratory tract bleeding in 100 patients attending alkindy teaching hospital.Type of the study: : Prospective descriptive observational study Methods of a group of patients consist of one hundred consecutive adult patients, with Lower respiratory tract bleeding are studied. History, physical examination, and a group of selected investigations performed,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref