Preferred Language
Articles
/
jcois-495
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Semi-Parametric Fuzzy Quantile Regression Model EstimationBased on Proposed Metric via Jensen–Shannon Distance
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
2021 International Conference On Intelligent Technology, System And Service For Internet Of Everything (itss-ioe)
Application of MQ-Sensors to Indoor Air Quality Monitoring in Lab based on IoT
...Show More Authors

Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Particle Size of Sawdust on Behaviour of Sawdust/UPE Composites in Water
...Show More Authors

The aim of the present work is to develop a new class of natural fillers based polymer composites with sawdust (S.D) which used two particle sizes (1.2 μm & 2.3 μm) and different weight percentage from sawdust (10%, 15%, and 20%). The mechanical properties studied include hardness (shore D) for all samples at normal conditions (N.C). The unsaturated polyester (UPE) and its composites samples were immersed in water for  30 days to find the effect of particle size of sawdust (S.D) on the weight gain (Mt %) by water for all the samples, also to find the effect of water on their hardness. The results show that the composite materials of sawdust (S.D) fillers which has particle size (1.2 μm) better than (2.3 μm) particle size bef

... Show More
View Publication Preview PDF
Publication Date
Tue May 04 2021
Journal Name
Journal Of Tribology
Hardened Edges Effects on Wear Characteristics of Cultivator Sweeps Using Circular Soil Bin Test
...Show More Authors
Abstract<p>Tillage tools are subject to friction and low-stress abrasive wear processes with the potential deterioration of the desired soil quality, loss of mechanical weed efficacy, and downtime for replacing worn tools. Limited experimental methods exist to quantify investigate the effect of wear-resistant coatings on shape parameters of soil-engaging tools. ASTM standard sand/rubber wheel abrasion and pin-on-disk tests are not able to simulate wear characteristics of the complex shape of the tillage tools. Even though the tribology of tillage tools can be realistic from field tests, tillage wear tests under field conditions are expensive and often challenging to generate repeatable engineeri</p> ... Show More
View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Open Veterinary Journal
Efficiency of C-type natriuretic peptide on improvement of Iraqi local ram’s epididymal sperms
...Show More Authors

Background: Fertility plays great role in animal reproduction since high quality semen improves sheep industry reproduction. The current worldwide data revealed the closely related of CNP to reproductive function of rams. Aims: Evaluation the effect of CNP on cooled sperms using the traditional and molecular assays. Methods: Totally, 20 testicular samples were collected, processed to obtain the semen samples and divided into two parts; one treated with the suitable dose of CNP and the otherserved as a control. Sperm samples of both groups were cooled for 3 days and tested at 0 0h, 24h, 48h and 72h. Results: The findings revealed that the suitable dose of CNP-treated sperms was 0.0110-13. Values individual motility, live sperm

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref