Preferred Language
Articles
/
oRYbFosBVTCNdQwCA8cu
Evolutionary multi-objective set cover problem for task allocation in the Internet of Things
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
The Efficiency of Belled Piles in Multi-Layers Soils Subjected to Axial Compression and Pullout Loads: Review
...Show More Authors

Multi-belled piles are piles with enlarged ends; these piles have one or further bells at the lower third part of the pile. These piles are suitable for many soils with problems such as softening clay, the variation of groundwater table, expansive soils, black cotton soil, and loose sand. The current study reviewed the behavior of belled piles in multi-layer soils subjected to axial compression and pullout loading. The review covered the experimental and theoretical works on belled piles in multi-layered soils. These piles were subjected to static and dynamic loadings in compression and pullout cases. Most theoretical results focused on software such as PLAXIS 3D. The axial load applied on the piles comes from the upper

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 29 2014
Journal Name
International Journal Of Academic Research In Progressive Education And Development
The Effects of Problem-Based Learning on Self-Directed Learning Skills among Physics Undergraduates
...Show More Authors

The aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette

... Show More
Publication Date
Wed Apr 01 2015
Journal Name
Mathematical Methods In The Applied Sciences
An inverse problem of finding the time-dependent diffusion coefficient from an integral condition
...Show More Authors

View Publication
Scopus (28)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Optimal Classical Continuous Control Quaternary Vector of Quaternary Nonlinear Hyperbolic Boundary Value Problem
...Show More Authors

This work is concerned with studying the optimal classical continuous control quaternary vector problem. It is consisted of; the quaternary nonlinear hyperbolic boundary value problem and the cost functional. At first, the weak form of the quaternary nonlinear hyperbolic boundary value problem is obtained. Then under suitable hypotheses, the existence theorem of a unique state quaternary vector solution for the weak form where the classical continuous control quaternary vector is considered known is stated and demonstrated by employing the method of Galerkin and the compactness theorem. In addition, the continuity operator between the state quaternary vector solution of the weak form and the corresponding classical continuous control qua

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Human Dignity and the Problem of Women Cutting Off Prayer: Women Cutting Off Prayer
...Show More Authors

Our creator has honored human beings and granted them a noble place, the provisions of the Islamic system are designed to strengthen and consolidate this dignity and respect. Since women are human beings, they have their respect, status and dignity. There are some prophetic sayings concerning women that may be understood as contrary to this value, the value of dignity and respect for human beings. One example is the Hadith of a woman cutting off a man’s prayer if she passed in front of his prayer. The study examines this topic and presents answers for it.

 

In dealing with the subject, the study followed the descriptive, analytical and deductive approach of mentioning legislative texts, analyzing them and deducing

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Indian Journal Of Pathology And Microbiology
Assessment of topoisomerase II-alpha gene status by dual color chromogenic in situ hybridization in a set of Iraqi patients with invasive breast carcinoma
...Show More Authors

Abstract Background: The human epidermal growth factor receptor 2(HER2) proto-oncogene is overexpressed or amplified in approximately 15%-25% of invasive breast cancers. Approximately 35% of HER2-amplified breast cancers have coamplification of the topoisomerase II-alpha (TOP2A) gene encoding an enzyme that is a major target of anthracyclines. Hence, the determination of genetic alteration (amplification or deletion) of both genes is considered as an important predictive factor that determines the response of breast cancer patients to treatment. The aims of this study are to determinate TOP2A status gene amplification in a set of Iraqi patients with breast cancer that have had an equivocal (2+) and positive HER2/neu by immunohistochemistry

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust estimation of multiple linear regression parameters in the presence of a problem of heterogeneity of variance and outliers values
...Show More Authors

Often times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Effects of Land Use and Land Cover on Concentrations of Heavy Metals in Surface Soils of Lesser Zab River Basin, NE Iraq
...Show More Authors

To investigate and assess the effects of land use and land cover (LULC) on concentrations of heavy metals in the surface soils of Lesser Zab River Basin (LZRB), 25 surface soil samples were taken from different LULC classes. Heavy metals concentrations were measured and their enrichment factors were calculated. Most of the LZRB soil samples are moderately alkaline with pH>8 and characterized by low organic content. The average abundance of the major oxides follow the decreasing order of SiO2 % > CaO % > Al2O3 % > Fe2O3 %> MgO > K2O % > TiO2 % > Na2O % > SO3 % > P2O5 %. A correlation matrix revealed that clay and feldspar minerals, Fe and Mn oxides / hydroxides are the most important carrier phase for several

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2007
Journal Name
2007 Ieee International Conference On Signal Processing And Communications
Fast Multi-level Image Vector Quantization
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref