Preferred Language
Articles
/
jcois-545
A book in the science of rhyme for the father of conquest Othman bin Jinni ‹v 392 e›: Investigation and study
...Show More Authors

This book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. In addition, Section II: Investigation, I talked about the description of the written version, and the method of investigation, followed by the text achieved, concluding the research mentioning proven sources and references. God grants success.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Association between infant Feeding Practices and Insulin – Dependent Diabetes Mellitus (IDDM)
...Show More Authors

Abstract The percent study aimed to determination the association between infant feeding practices and Insulin-Dependent Diabetes Mellitus (IDDM). The study was conducted at (he National Center of Diabetes in Baghdad City the Capital of Iraq throughout the period of January 2001 to January 2002. The sample was comprised of (200) mother of Insulin-Dependent Diabetes Mellitus (IDDM) of children under age of 12 years old. Data was collected through the use of a questionnaire that constructed by researcher and which were developed for the purpose of the present study. Reliability of the instruments was dete

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2026
Journal Name
Atención Primaria
Association between smoking and chronic low back pain among medical students
...Show More Authors

Resumen Introducción Debido a su exigente entorno académico, el dolor lumbar crónico (DLC) es un trastorno musculoesquelético común entre los estudiantes de medicina, lo cual es particularmente preocupante. El tabaquismo es un factor de riesgo conocido por causar diversos problemas de salud y se ha asociado con el DLC, pero la relación específica entre el tabaquismo y el DLC aún no ha sido bien explorada. Objetivo Este estudio tiene como objetivo investigar la asociación entre el tabaquismo y el DLC en estudiantes de medicina en Irak. Diseño Se empleó un diseño descriptivo transversal que involucró entrevistas cara a cara con 200 estudiantes de medicina de 18 años o más. Los datos sobre características demográficas, comport

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (89)
Crossref (90)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Regression shrinkage and selection variables via an adaptive elastic net model
...Show More Authors
Abstract<p>In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in </p> ... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Determine, Predict and Map Soil pH Level by Fiber Optic Sensor
...Show More Authors
Abstract<p>Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.</p> ... Show More
View Publication
Scopus (16)
Crossref (6)
Scopus Crossref