Preferred Language
Articles
/
jih-753
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation
...Show More Authors

   A common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Robust Blind Watermarking Technique Against Geometric Attacks for Fingerprint Image Using DTCWT-DCT
...Show More Authors

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Design and Implementation of Classical Sliding Mode Controller for Ball and Plate System
...Show More Authors

Ball and Plate (B&P) system is a benchmark system in the control engineering field that has been used to verify many control methods. In this paper the design of a sliding mode . controller has been investigated and verified in real-time via implementation on a real ball and plate system hardware. The mathematical model has been derived and the necessary parameters have been measured. The sliding mode controller has been designed based on the obtained mathematical model. The resulting controller has been implemented using the Arduino Mega 2560 and a ball and plate system built completely from scratch. The Arduino has been programmed by the Arduino support target for Simulink. Three test signals has been used for verification purposes

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Tuning of PID Controllers for Quadcopter System using Cultural Exchange Imperialist Competitive Algorithm
...Show More Authors

Quadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of stressful life events for patients with substance abuse in Baghdad city
...Show More Authors

Objective: The present study aims to assess the stressful life events for patients with substance abuse in Baghdad city.
Methodology: A descriptive study was carried out at (Baghdad teaching hospital and Ibn-Rushed Psychiatric hospital).
Starting from 1
st of December 2012 to 3
rd of July 2013, A non-probability (purposive) sample of 64 patients that
diagnosed with substance abuse, the data were collected through the use of semi-structured interview by
questionnaire, which consists of three parts sociodemographic data, medical information, and Life events scale
consists of 49-items distributed to six domains including, family and social domain, health domain, security, legal and
criminal domain, work and school do

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Quality of Life for Patients with Permanent Pacemaker in Baghdad City
...Show More Authors

Objectives: To determine the (QoL) for patients with permanent pacemaker and to find-out the relationship between
these patients’ (QoL) and their sociodemographic characteristics such as age, gender, level of education, and
occupation.
Methodology: ٨ purposive non-probability” sample of (62) patient with permanent pacemaker was involved in this
study. The developed questionnaire consists of (4) parts which include !.demographic data form, 2.disease-related
information form, 3.socioeconomic data form, and 4.Permanent pacemaker patient’s quality of life questionnaire data
form. The validity and reliability of the questionnaire were determined through the application of a pilot study. ٨
descriptive statistical a

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
MEASURING OF FARMERS ADOPTION LEVEL FOR MODERN IRRIGATION SYSTEM AND THEIR WIDE APPLICATION
...Show More Authors

74 fanners were randomily selected from the Lc:ital. of 406 fanners using the Modern Irrigation System up to November , 2000 , for the purpose of wide adoptation of such system. Rcsults indicated according to the data which has been obtained and statistically analysed by the statistical package for the Social Sciences (SPSS) program showed that the majority of the farmers adopted this new system of irrigation due to the increase in the yield up to 5" .

View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Boundary Optimal Control for Triple Nonlinear Hyperbolic Boundary Value Problem with State Constraints
...Show More Authors

The paper is concerned with the state and proof of the solvability theorem of unique state vector solution (SVS) of triple nonlinear hyperbolic boundary value problem (TNLHBVP), via utilizing the Galerkin method (GAM) with the Aubin theorem (AUTH), when the boundary control vector (BCV) is known. Solvability theorem of a boundary optimal control vector (BOCV) with equality and inequality state vector constraints (EINESVC) is proved. We studied the solvability theorem of a unique solution for the adjoint triple boundary value problem (ATHBVP) associated with TNLHBVP. The directional derivation (DRD) of the "Hamiltonian"(DRDH) is deduced. Finally, the necessary theorem (necessary conditions "NCOs") and the sufficient theorem (sufficient co

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Preparation of Ag nanoparticles via pulsed laser ablation in liquid for biological applications
...Show More Authors

Ag nanoparticles were prepared using Nd:YAG laser from Ag matel in distilled water using different energies laser (100 and 600) mJ using 200 pulses, and study the effect of the preparation conditions on the structural characteristics of and then study the effect of nanoparticles on the rate of killing the two types of bacteria particles (Staph and E.coli). The goal is to prepare the nanoparticle effectively used to kill bacteria.

View Publication Preview PDF
Crossref (2)
Crossref