Preferred Language
Articles
/
jeasiq-1169
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
The Factors influencing to the cognition operation & its Data: وفاء جاسم محمد
...Show More Authors

The present research deals with the influencing factors which depends on the way perceptual of the graphic designer which enters in the design logos of the loco European health, where the search include four chapters, the researcher reviewed in the chapter 0ne the methodical frame of the research ,as reviewed in the second chapter the theoretical frame, and the previous studies which included three sections, the first section included the perceptual understandable and types of it, and the second section included the influencing factors in the designer perceptual ways and its division . While the third section included the perceptual in graphic designer through the percepted shapes and the relation with ground and colors for express the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 06 2022
Journal Name
Kuwait Journal Of Science
AVO analysis for high amplitude anomalies using 2D pre-stack seismic data
...Show More Authors

Amplitude variation with offset (AVO) analysis is an 1 efficient tool for hydrocarbon detection and identification of elastic rock properties and fluid types. It has been applied in the present study using reprocessed pre-stack 2D seismic data (1992, Caulerpa) from north-west of the Bonaparte Basin, Australia. The AVO response along the 2D pre-stack seismic data in the Laminaria High NW shelf of Australia was also investigated. Three hypotheses were suggested to investigate the AVO behaviour of the amplitude anomalies in which three different factors; fluid substitution, porosity and thickness (Wedge model) were tested. The AVO models with the synthetic gathers were analysed using log information to find which of these is the

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Comparison of Groundwater Quality and Quantity between Al-Rahbah and Al-Haydariyah Regions
...Show More Authors

This study focused on two areas in AL-Najaf city, AL-Ruhbah and Al-Haydariyah regions because of the importance and widespread use of groundwater in these areas. The two areas were compared quantitatively and qualitatively. For the quantitative approach, the GMS software was used in conjunction with the GIS software to simulate the groundwater flow behavior. The solid model for both areas was created, the geological formation was determined, and the hydraulic properties were identified using GMS software. To test the quantity of groundwater in both areas, the wells have been redistributed to a distance of 2000 m between them, and a period of 1000 days was chosen. When a discharge of 10 l/s and operation times of 4, 8, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Comparison Study between Iraqi Conditions of Contract and FIDIC Conditions- The Red Book
...Show More Authors

Reconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 25 2023
Journal Name
Tikrit Journal Of Pure Science
Chemical comparison and Trichomes types of Salvia species growing in Anbar Governorate – Iraq
...Show More Authors

The trichomes and chemical composition of three species of the genus Salvia wild-grown (Salvia lanigera, Salvia spinosa) and cultured (Salvia officinalis) were studied in the Anbar governate, the chemical components of the stem and leaves were studied by Gas chromatography–mass spectrometry(GC-MS), in addition to studying the trichomes of the epidermis in the stem and leaves (upper and lower epidermis) by Light microscope. Important differences appeared to us in the chemical study, where it was found that some compounds were found in species without others, which gives them taxonomic importance, also, the trichomes were important in distinguishing the studied species, the species S. spinosa was distinguished by the presence of gla

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering And Development
Comparison Study of (urinary & serum) AST Activity from Patients with type 2 diabetes
...Show More Authors

Aspartate aminotransferase was purified from urine and serum of patients with type 2 diabetes in a 2 steps procedure involving dialysis bag and sephadex G-25 gel filtration (column chromatography). The enzyme was purified 346.23 fold with 1467% yield and 3.46 fold with 142.85% yield in urine and serum of patients with type 2 diabetes respectively. The purified enzyme showed single peak. The results of this study revealed that AST activity of type 2 diabetes urine and serum increased significantly (p<0.001) compared with control group.