Preferred Language
Articles
/
ijs-8226
Finding the Best Analysis for the Sleeper Cells of Terrorist Acts in the Crowded Areas of Human Activities in the City of Baghdad
...Show More Authors

     Terrorist operations disturbed societies and threatened their existence due to destructive ideas carried by those groups that believe in radical change and the use of multiple methods to implement their ideas, as well as taking methods of concealment among society, so it has become difficult to detect them. The study's purpose is to locate sleeper cells of terrorist operations in areas dense with various human activities using remote sensing techniques and geographic information systems programs. The programs were used to analyze the group of terrorist incidents data that occurred in Baghdad in 2011 and study how to limit the crimes spreading in Baghdad. The study included building a model in spatial information systems for sites by identifying the accidents by simulating the reality with the Global Positioning System (GPS) to be a starting point for the spatial analysis of the accidents and devising a scientific approach to locate sleeper cells using statistical methods and theories. Moreover, predictive research focuses on several spatial studies to produce predictive maps for the sleeper cell sites spreading from their location toward the cities. The GIS proved to be one of the primary software packages that help decision-makers take appropriate measures at the right time, predict the spatial spread of future accidents, and control them in the future to be an effective model for researchers.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image co

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
المجلة العلمية لعلوم وفنون الرياضة
العلاقة بين طول الذراع وبعض المتغيرات البايوكينماتيكية في سباحة الفراشة (50 متر) لسباحي المنتخب الوطني
...Show More Authors

Competitive swimming is a highly researched area and technological developments have aided advances in the understanding of the biomechanical principles that underpin these elements and govern propulsion. Moreover, those working in the sports field especially in swimming are interested in studying, analyzing, evaluating and developing motor skills by diagnosing the strengths and weaknesses of the skill, and accordingly, coaches and specialists correct these errors. The researchers chose this (Butterfly swimming) and the (arm length) is an important variable because the success of the stroke is greatly dependent on the propulsion generated from the arm pull, and swimmers with a longer arm span have a mechanical advantage with the resulting f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Aggregate accounting information and its impact on management decision-making ( Case Study )
...Show More Authors

The main aim of this paper is to explain the effect of the aggregation accounting information on the financial, investment, and operational, managerial decision-making and the evaluation of the financial statements after aggregate. The problem of this study is represented in administrative decision-making that takes place under differentiated accounting systems operating within a governmental economic unit that seeks at the same time to achieve a unified vision and goals for the organization. This study was conducted at the College of Administration and Economics /University of Baghdad, and it represents a sample from a community of governmental economic units that apply differentiated accounting systems. The study method is repr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
PHOTO DYNAMIC THERAPY (PDT) WITH BIOLOGICAL TISSUES USING ND:GLASS LASER
...Show More Authors

A Photo Dynamic Therapy (PDT) is a technique which is used with Laser to treat many of cancer
tissues. This paper deals with the relatively new therapeutic technique (PDT) with pulsed Nd:glass Laser
which was applied to human soft tissues (Ovary and Kidney tissues), and to the hard tissues (freshly
extracted human teeth), with power density of 280 watt/mm2 and exposure time 330 usec. Different
dyes (Blue, methylene, eosin, and orange) were applied to the area before irradiation to study the effect
of the pigments on the laser interaction with biological tissues. The zone of treatment (Z-necrosis) with
aid of MATLAB was determined. The relationship of zone of treatment with exposure time,
accumulated damage and fracti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Synchronous Buck Converter with Perturb and Observe Maximum Power Point Tracking Implemented on a Low-Cost Arduino-microcontroller
...Show More Authors

Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Determination local geoid Heights Using RTK-DGPS/Leveling and transformation methods
...Show More Authors

Geodesy is concerned with the relative positioning of points and the gravity field of the earth. For this task, a well-defined coordinate system is needed on which measurements are normally tied to a set of reference points called a geodetic datum (geoid or ellipsoid). The Global Positioning System GPS gives accurately the three-dimensional position of a point (latitude, longitude, and ellipsoidal height) and can measure under all weather conditions. The coordinates of the GPS reference to the World Geodetic System1984 (WGS 84), a global ellipsoid having its origin as the mass center of the earth, and height, referenced to the surface of the ellipsoid . In this research , using RTK-DGPS technique Data collection for study local and level

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Optimal CPU Jobs Scheduling Method Based on Simulated Annealing Algorithm
...Show More Authors

     Task scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref