Preferred Language
Articles
/
joe-478
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, which lead to a homogenous and anisotropic network, respectively  using Matlab programming language (V. 2012a). Al Ghammas Township, Al-Qadisiya city, which consists of twenty-five stations was taken as a study area in this research.

The results showed that there are 300 potential baselines for the GNSS network of the study area, which were reduced during the optimum configuration to about 70% of the total potential baselines by applying FOD-p, and there is high level of improvement in the objective functions of precision which  reached to about 90% .

 

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Third Order Differential Subordination for Analytic Functions Involving Convolution Operator
...Show More Authors

       In the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.

View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 24 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST RECORDS OF PHOLCIDAE (ARACHNIDA, ARANEAE) FROM IRAQ
...Show More Authors

    The family Pholcidae represented by the species Artema doriae )Thorell, 1881) is recorded in Iraq for the first time.So far, 23 families of spiders have been recorded in Iraq.

     In this paper, we add a new family and a description of a species belonging to this family in the checklist of Iraqi spider fauna.

View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST RECORD OF FIVE NEMATODES FROM IRAQI TURTLES
...Show More Authors

During a survey on the helminthic parasites of three species of turtles in the north part of Iraq, five species of nematodes were recorded for the first time in Iraq. They were all found in the intestine. These are, Camallanus microcephalus (Dujardin, 1845) recorvered from the turtle Clemmys caspica; Spironoura japonensis (Yamaguti, 1935) from Triopyx eup¬hraticus and Angusticaecum holopterum (Rudolphi, 1819), and Tachygonetria nicollei (Seurat, 1918) from the turtle Testudo graeca. All of the localities and hosts are newly recorded in Iraq.

View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Active design and its principles in industrial product design
...Show More Authors

 The problem of the research came through the following question (what is the effectiveness of active design in contemporary industrial products), and it emphasized the importance of research to make society with its members in a positive state of activity, and what can help the industrial product design to achieve this, but the goal of the study is (determining the characteristics and principles of design Active and its effectiveness in the industrial product), and the study was determined by industrial products related to daily, recreational and sports activity, The researcher relied on a form to determine the axes of analysis for the sample models, in order to reach the results of the research, the most important of which are: Realiz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control &amp; Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref