Preferred Language
Articles
/
jcois-526
Memorizer Keeper      And his method in his masterpiece      Supervision by the parties
...Show More Authors

What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Choosing the best method for estimating the survival function of inverse Gompertz distribution by using Integral mean squares error (IMSE)
...Show More Authors

In this research , we study the inverse Gompertz distribution (IG) and estimate the  survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes

View Publication
Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study of the x-ray diffraction lines of calcium titanate nanoparticle using SSP method and Scherrer method
...Show More Authors

In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
أبو بكر الرازي رائد الطب السريري في كتابه الحاوي في الطب
...Show More Authors

في مدينة الري القريبة من طهران الحالية ولد ابو بكر محمد بن يحيى بن زكريا الرازي سنة 251هـ/865 م وسميً بالرازي نسبة الى مدينة الري 0 أحب الرازي الغناء والضرب على العود في بداية حياته ثم هجر ذلك كله واتجه الى الطب والكيمياء 0 درس الطب في شبابه في بغداد وقد اخطأ بعض المؤرخين في ظنهم ان

View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Fri Aug 19 2022
Journal Name
Mathematical Statistician And Engineering Applications (msea)
Application of TOPSIS method for Multi-Criteria Decision Making for poultry fields By using GIS in Hilla district
...Show More Authors

Statistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu

... Show More
Publication Date
Thu Sep 18 2025
Journal Name
Al-rafidain University College For Sciences
“Simple Regression Analysis by using Linear Programming Technique and illustration of Absolute Residuals method with another Estimation Techniques”
...Show More Authors

This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
PREPARATION OF ACTIVATED CARBONS FROM DATE STONES BY CHEMICAL ACTIVATION METHOD USING FeCl3 and ZnCl2 as ACTIVATING AGENTS
...Show More Authors

Date stones were used as precursor for the preparation of activated carbons by chemical
activation with ferric chloride and zinc chloride. The effects of operating conditions represented
by the activation time, activation temperature, and impregnation ratio on the yield and adsorption
capacity towards methylene blue (MB) of prepared activated carbon by ferric chloride activation
(FAC) and zinc chloride activation (ZAC) were studied. For FAC, an optimum conditions of 1.25
h activation time, 700 °C activation temperature, and 1.5 impregnation ratio gave 185.15 mg/g
MB uptake and 47.08 % yield, while for ZAC, 240.77 mg/g MB uptake and 40.46 % yield were
obtained at the optimum conditions of 1.25 h activation time, 500

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref