Preferred Language
Articles
/
jeasiq-1204
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Determination of optimal conditions for laccase production by Pleurotus ostreatus using sawdust as solid medium and its use in phenol degradation
...Show More Authors

The ability of four local fungal isolates for extracellular laccase production has been tested with five grams 1:1(w/v) humidified sawdust as substrate in mineral salt medium. After 21 day of incubation at 25±1 ? C and using one mycelial plug (5mm), higher level of laccase activity (0.15U/ml) and specific activity (15U/mg) were observed by Pleurotus ostreatus in comparison with other fungal isolates. The results of optimum conditions for laccase production from selected isolate showed that, the maximum laccase activity (0.55U/ml) and specific activity (55U/mg) were obtained at moisture ratio 1:3 (w/v), using 3 mycelial plugs (5 mm), after 15 days incubation period at 25±1 ? C. The results of phenol degradation by crud laccase revealed th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
تحليل كتاب الكيمياء للصف الثالث المتوسط على وفق قضايا العلم والتكنولوجيا والمجتمع والبيئة ( S.T.S.E )
...Show More Authors

The aim of the present research is to know the following :

 What are the Science and technology, society and environment issues (S.T.S.E) which included in the content of the chemistry Book third grade intermediate ?

And to achieve the objective of search The two researchers has prepares a list of science and technology, society and environment issues (STSE) consisted of (9) key issues namely ( Air quality and the atmosphere, sustainable development, water security, health and preventive security, mineral resources investment, pollution of various kinds, energy, food industry, production of weapons technology ) and from which (70) sub-issues emerge, Arbitrators competent agreement has been received . Then, the two re

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Success Of The Project Management In light of the Learning Organization Characteristics field reserche for the opinion of simple of worker at the State Commission For Road and Bridge
...Show More Authors

Abstract                                                                                                                       &nbsp

... Show More
View Publication Preview PDF
Crossref