Preferred Language
Articles
/
jeasiq-1016
Analysis of the composite variance of dissected splitting experiments carried out according to the Latin box design
...Show More Authors

In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically)  the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 15 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Nano M. and nano IM. sets in nano topological spaces
...Show More Authors

studied, and its important properties and relationship with both closed and open Nano sets were investigated. The new Nano sets were linked to the concept of Nano ideal, the development of nano ideal mildly closed set and it has been studied its properties. In addition to the applied aspect of the research, a sample was taken from patients infected with viral hepatitis, and by examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous disease.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Boosting E-learner’s Motivation through Identifying his/her Emotional States
...Show More Authors

The main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Location Aspect Based Sentiment Analyzer for Hotel Recommender System
...Show More Authors

Recently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2015
Journal Name
Journal Of Physical Education
دراسة تحليلية مقارنة، لبعض المتغيرات الكينماتيكية، في أداء مهارة(Nick shot) الأمامية العكسية، بين لاعبي المنتخب العراقي والمصري، للشباب في الإسكواش
...Show More Authors

هدفت الدراسة الى التعرف على مستوى استخدام إدارة المعرفة و تكنولوجيا المعلومات لدى القيادات الإدارية تُعدّ لعبة الإسكواش من الألعاب الفردية، وواحدة من ألعاب المضرب، والتي تمتاز بالسرعة والحركة الدائمة في داخل القاعة، ولعل أهم ما يميز هذه اللعبة المتعة التي يشعر بها اللاعبون الممارسون لها، لأنها تجبر ممارسيها على الحركة المستمرة عن طريق تبادل لعب الكرة، وتتميز بالتحدي المباشر، وتتطلب اليقظة والحرص وال

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Collage Of Education
FILTER BASES AND ω-PERFECT FUNCTIONS
...Show More Authors

In this paper introduce some generalizations of some definitions which are, closure converge to a point, closure directed toward a set, almost ω-converges to a set, almost condensation point, a set ωH-closed relative, ω-continuous functions, weakly ω-continuous functions, ω-compact functions, ω-rigid a set, almost ω-closed functions and ω-perfect functions with several results concerning them.

Preview PDF
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref