Preferred Language
Articles
/
ijs-5832
The Moon, Sun and Jupiter coordinates and distances variation through 100 years
...Show More Authors

In this research calculate the ecliptic and equatorial coordinates for the Moon , Sun and Jupiter through 100 years and calculate the distances between the Moon and the Earth , the Sun and the Earth , Jupiter and the Sun, Jupiter and the Earth . From Calculation and discussion the changes in the equatorial coordinate were: Δ , Δ δJ = (22.73+21.93, 23.28+22.99) , and the maximum values and minimum values for the Moon were: Rm(min) = 0.00239,0.00240 and Rm(max) = 0.0027,0.00272 , and Jupiter RJ(min) = 4.99077,4.99966 and RJ(min) = 5.44469,5.45057 , and the periods change preface to calculate the conjunction of the Moon and Jupiter. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Engineering
The Causes Influencing the Occurrence of Variation Orders in the Construction of Buildings
...Show More Authors

In the construction of buildings usually, problems occur because of the causes of change orders. The main causer of change orders is the owners, consultants, and contractors. These changes lead to conflicts among them which result in influencing building projects. Therefore, it is necessary to analyze the causes of change orders to reduce them and facilitate management. This paper determines the most critical factors that cause change orders from a different point of view, a consulting owner and a contractor, and a study of the reality of the management of change orders when constructing public buildings. The method employed in this research is a field survey using interviews with experts working in the construction of p

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Spatial Analysis of Relative Humidity and Its Effect on Baghdad City for The Years 2008, 2013 and 2018
...Show More Authors

      Urbanization phenomenon did expand rapidly in Baghdad-Iraq due to security improvement and the human desire for daily services availability, where reducing the agricultural lands "Greenlands" negatively affected the climate rate. The relationship between urban expansion and relative humidity was studied from 2008 to 2018 using remote sensing data (satellite images of Landsat 5 and Landsat 8) and relative humidity rate data obtained from the European Centre for Medium-Range Weather Forecasts (ECMWF). Data were processed and analyzed using ArcGIS v: 10.2. Results showed changes in human activities (land use (LU)) and urban areas, where increasing urbanization declines vegetation and turbulence climate. The study provides a signi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Reading beauty through the views of philosophers and its reflection in graphic design
...Show More Authors

The creative production of the philosophy of beauty in artistic works constitutes a step towards development and progress by meeting the growing and changing needs of humanity according to various factors, including those related to the human situation and others related to technical outputs, as well as the multiplicity of the field for the emergence of new artistic currents and movements concerned with graphic production and communication and communication processes that It is associated with imagination and freedom from social and cultural constraints, in which the design production seeks to link more realistic intellectual contents with the achievements of the creative artwork as a communication system to involve the recipient (the vi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Imaging and clinicopathological characteristics of breast cancer among women under the age of 40 years
...Show More Authors

Background: although breast cancer in young women is less common and often overlooked, it is still considered a major health concern.
Objectives: to evaluate the demographic, clinical, radiological and histopathological characteristics of breast cancer among a sample of Iraqi women diagnosed under the age of 40 years.
Patients and methods: a retrospective study enrolled 73 females below the age of 40 years with a history of breast cancer. All data was extracted from an established information system database designed by the Principal Investigator of the Iraqi National Breast Cancer Research Project under supervision of the International Agency for Research on Cancer (IARC) over a 4-years period from 2011 to 2014.
Results: sevent

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Imaging and clinicopathological characteristics of breast cancer among women under the age of 40 years
...Show More Authors

Background: although breast cancer in young women is less common and often overlooked, it is still considered a major health concern.
Objectives: to evaluate the demographic, clinical, radiological and histopathological characteristics of breast cancer among a sample of Iraqi women diagnosed under the age of 40 years.
Patients and methods: a retrospective study enrolled 73 females below the age of 40 years with a history of breast cancer. All data was extracted from an established information system database designed by the Principal Investigator of the Iraqi National Breast Cancer Research Project under supervision of the International Agency for Research on Cancer (IARC) over a 4-years period from 2011 to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Investigating the Optimal Duration of the Sun Exposure for Adequate Cutaneous Synthesis of Vitamin D3 in Baghdad City: Depending on Fitzpatrick Skin Classification for Different Skin Types
...Show More Authors

     Vitamin D3 deficiency is regarded as a public health issue in Iraq, particularly during the winter. Sun exposure is the main source of vitamin D3, where the surface ultraviolet (UV) radiation plays an important role in human health. The amount of time that must be spent in the sun each day was determined for the amount of exposed skin, for all skin types, with and without sunscreen under clear sky conditions in the city of Baghdad (Long 44.375, Lat 33.375). UV index data was obtained by TEMIS satellite during the year 2021. From data analysis, we found that most days during the year were within the high level of ultraviolet radiation values ​​in the city of Baghdad, and most of them were during the summer, where the person n

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Engineering
DESIGN OF A VARIABLE GAIN NONLINEAR FUZZY CONTROLLER AND PERFORMANCE ENHANCEMENT DUE TO GAIN VARIATION
...Show More Authors

In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.