Preferred Language
Articles
/
ijs-7267
The Suitability of Fatha Clay Deposits for Clay Bricks Industry in Zurbatiya Area, Eastern Iraq
...Show More Authors

     This research aims to study the suitability of the Fatha Formation clay deposits for the brick industry in the Zurbatiya area, Wasit Government. Two sites (Al-Salam police station and Al-Taff station) were selected. The clay deposits were subjected to particle size analysis, atterberg limits, chemical and mineralogical analyses. The samples have 31.45% clay, 52.91% silt, and 15.64% sand. Chemical analyses revealed that SiO2 and CaO are the clay deposits' main components, indicating the high content of quartz and calcium carbonate. The mineralogical analysis by XRD techniques indicated that quartz, calcite, feldspar, gypsum, and dolomite are the non-clay minerals; Kaolinite, illite, palygorskite and chlorite are the most clay minerals, followed by the mixed layer (montmorillonite-chloride). Clay brick samples were formed, dried and then fired using a particular firing program. The produced bricks have good water absorption (20-24.06%), compressive strength (36.23-41.63 N/mm2), and efflorescence (moderate – slight to nill). The properties of the produced clay bricks agree with the requirements of class A and B of the Iraqi Standard Specifications No.25,1993, British (BS 3921, 1985 ), and American  Standard (ASTM C10, 2010).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Fuzzy Based Clustering for Grayscale Image Steganalysis
...Show More Authors

Fuzzy Based Clustering for Grayscale Image Steganalysis

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Several Nonlinear Estimators for Regression Function
...Show More Authors

The aim of this paper is to estimate a nonlinear regression function of the Export of the crude oil Saudi (in Million Barrels) as a function of the number of discovered fields.

 Through studying the behavior of the data we show that its behavior was not followed a linear pattern or can put it in a known form so far there was no possibility to see a general trend resulting from such exports.

We use different nonlinear estimators to estimate a regression function, Local linear estimator, Semi-parametric as well as an artificial neural network estimator (ANN).

The results proved that the (ANN) estimator is the best nonlinear estimator am

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Covering Theorem for Finite Nonabelian Simple Groups
...Show More Authors

In this paper, we show that for the alternating group An, the class C of n- cycle, CC covers An for n when n = 4k + 1 > 5 and odd. This class splits into two classes of An denoted by C and C/, CC= C/C/ was found.

View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Asking for permission and its legal ruling
...Show More Authors

Praise be to God, Lord of the Worlds, and the best blessings and peace be upon our master Muhammad and all his family and companions, and those who follow them with goodness until the Day of Judgment. . And after:

God created man in the best manner, and subjugated the universe to him and favored him over the rest of creation when he gave him a mind to contemplate and know how to distinguish between the harmful and the beneficial, the bad and the good, in order to exploit him in achieving the meaning of worship, because it is the highest goal of his creation. God Almighty said (And I did not create the jinn and mankind. Except that they worship them.” [Al-Dhariyat: 56]

If knowing what is harmful from what is beneficial a

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Requirements for Implementing School Performance Indicators System
...Show More Authors

The aim of the research is to find out the availability of the requirements of applying the indicators of school performance system in the public schools in  Mahayel Asir educational directorate through the school planning indicator, the safety and security indicator, the active learning indicator, the student guidance indicator and determining the existence of statistically significant differences between the responses of the research community according to the variable of (scientific qualification - years of work as a principal - training courses). The questionnaire was used as a tool for data collection from the research community, which consists of all the public schools’ principals (n=180) Mahayel Asir educational directorate

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Iraq's Public Budget for 2015 Ambition & challenges
...Show More Authors

One of the most critical functions of the government is the devising and planning for the Public Budget for the coming years. Studying any budget of any given state would directly reflect on its intentions and collective direction during a certain time span. Since all allocations represent the government's agenda and time plan for coming years. And the size of each allocation would measure the priority of each budgetary item. Because of the eminent importance of the public budget planning in Iraq, a country of abundant riches and human resources that flow in the national economy, we present this research that would cover the resources versus expenditures of Iraq's public budget endured by the government to sustain its various sec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Genetic Algorithm based Clustering for Intrusion Detection
...Show More Authors

Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref