Preferred Language
Articles
/
jperc-139
The norms of Minnesota multi faces personality inventory (second edition) MMPI-2 and the sixteen personality factor questionnaire of catel (fifth edition)
...Show More Authors

The aim of the current study is to create special norms of the second edition of Minnesota multi faces personality inventory, and the fifth edition of the sixteen personality factor questionnaire of catel. To this end, the researcher applied the Minnesota multi faces personality inventory over a sample of (1646) secondary and university students as well as plenty of disorders. She also applied the sixteen personality factor questionnaire of catel on (4700) secondary and university students. SPSS tools were used to process data.  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Strong Differential Sandwich Results for Analytic Functions Associated with Wanas Differential Operator
...Show More Authors

    In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Strongly Coretractable Modules
...Show More Authors

Let R be a ring with identity and M be a right unitary R-module. In this paper we
introduce the notion of strongly coretractable modules. Some basic properties of this
class of modules are investigated and some relationships between these modules and
other related concepts are introduced. 

View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Laser Peening on Aluminum Alloy 7049 Using Black Paint Surface Coating
...Show More Authors

Abstract

Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable   bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present  work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life  improvement factor (FLIF)  for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated  fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav

... Show More
View Publication Preview PDF