Preferred Language
Articles
/
ijs-3454
Ensemble Approach for Detecting COVID-19 Propaganda on Online Social Networks
...Show More Authors

     COVID-19 affected the entire world due to the unavailability of the vaccine. The social distancing was a contributing factor that gave rise to the usage of Online Social Networks. It has been seen that people share the information that comes to them without verifying its source . One of the common forms of information that is disseminated that have a radical purpose is propaganda. Propaganda is organized and conscious method of molding conclusions and impacting an individual's contemplations to accomplish the ideal aim of proselytizer. For this paper, different propagandistic tweets were shared in the COVID-19 Era. Data regarding COVID-19 propaganda was extracted from Twitter. Labelling of data was performed manually using different propaganda identification techniques  and Hybrid feature engineering was used to select the essential features. Ensemble machine learning classifiers were used for performing the binary classification. Adaboost shows an accuracy of 98.7%, which learns from a weak learning algorithm by updating the weights.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of Magnetized Water Treatment on some Biological Aspects for Fresh Water Snail Lymnaea lagotis (Schrank,1803)
...Show More Authors

Exposure assays to magnetized water have so far revealed striking results. The present study was conducted to determine the effects of magnetized water treatment with in different intensities 500 , 1000 and 1500 Gauss on some biological aspects for species of freshwater Gastropod Lymnaea lagotis (Schrank, 1803) which important species in faun of aquatic habitats of Iraq. This species are considered a component of the food chain. The obtained results compared with these species which lived in the river(control). Result of these experiments showed increased significance the shell size (shell high, shell aperture length, shell aperture width and shell width) for L. lagotis with increased intensity magnetized water such as treated water with 1

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Study Of Thickness And Annealing Temperature Effect On Structural and Optical Properties For ZnO Thin Films
...Show More Authors

  In the present work, We study the structural and optical properties of (ZnO), which are prepared by thermal evaporation technique, where deposit (Zn) on glass substrates at different thicknesses (150,250,350)nm, deposited on glass substrate at R.T. with rate (5 nm sec-1). And then we make oxidation for (Zn) films at temperature (500) and using the air for one hour, and last annealing samples at temperature (400,500) for one hour. The investigation of (XRD) indicates that the (ZnO) films are polycrystalline type of hexagonal with a preferred orientation along (002) to all samples and analysis reveals that the intensity of this orientation increases with the increase of the thickness and annealing temperature.   &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations
...Show More Authors

        In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using  Mathcad 15.and graphic in Matlab R2015a.

View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Study on the Contact Angle, Adhesion Strength, and Antibacterial Activity of Polymer/Cement Composites for Waterproof Coating
...Show More Authors

     In the present work, polymeric composites were prepared for coating floors and swimming pools in dark colors. This was achieved through the use of a polymer coating solution added to fine cement with weight percentage (wt%) values of 5, 10, 15, 20, and 25 to obtain dark-colored (gray) composites. Mortar samples were prepared using the adhesion test. The contact angle and adhesion strength were studied for the prepared samples concerning the effect of changing the weight ratio of additive cement on water absorption. Also, the antibacterial activity was tested for the prepared coatings. The results showed that the contact angle increases with increasing the weight ratios of additive cement, which indicates that the

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Construction And Building Materials
Uni- and tri-axial tests and property characterization for thermomechanical effect on hydrated lime modified asphalt concrete
...Show More Authors

Permanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF