Preferred Language
Articles
/
ijp-915
Characterization of CdS quantum dots prepared by a Chemical Method
...Show More Authors

The CdS quantum dots were prepared by chemical reaction
of cadmium oleylamine (Cd –oleylamine complex) with the
sulfite-oleylamine (S-oleylamine) with 1:6 mole ratios. The
optical properties structure and spectroscopy of the product
quantum dot were studied. The results show the dependence of the
optical properties on the crystal dimension and the formation of
the trap states in the energy band gap.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
K-Nearest Neighbor Method with Principal Component Analysis for Functional Nonparametric Regression
...Show More Authors

This paper proposed a new  method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates  are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It  utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA))  for measureing the closeness between curves.  Root Mean Square Errors is used for the  implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when  the cov

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Finite Difference Method for Two-Dimensional Fractional Partial Differential Equation with parameter
...Show More Authors

 In this paper, we introduce and discuss an algorithm for the numerical solution of two- dimensional fractional partial differential equation with parameter. The algorithm for the numerical solution of this equation is based on implicit and an explicit difference method. Finally, numerical example is provided to illustrate that the numerical method for solving this equation is an effective solution method.

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Linear Boundary Value Problem Using Shooting Continuous Explicit Runge-Kutta Method
...Show More Authors

  In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem  which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.

View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Proposed method to estimate missing values in Non - Parametric multiple regression model
...Show More Authors

In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.

 

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Physics
Positron Interactions with Some Human Body Organs Using Monte Carlo Probability Method
...Show More Authors

In this study, mean free path and positron elastic-inelastic scattering are modeled for the elements hydrogen (H), carbon (C), nitrogen (N), oxygen (O), phosphorus (P), sulfur (S), chlorine (Cl), potassium (K) and iodine (I). Despite the enormous amounts of data required, the Monte Carlo (MC) method was applied, allowing for a very accurate simulation of positron interaction collisions in live cells. Here, the MC simulation of the interaction of positrons was reported with breast, liver, and thyroid at normal incidence angles, with energies ranging from 45 eV to 0.2 MeV. The model provides a straightforward analytic formula for the random sampling of positron scattering. ICRU44 was used to compile the elemental composition data. In this

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref