Preferred Language
Articles
/
pRfaZo4BVTCNdQwCJkbO
Ornamental Fishes: A Looming Danger for Inland Fish Diversity of Iraq
...Show More Authors

Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Applied Soft Computing
A new evolutionary algorithm with locally assisted heuristic for complex detection in protein interaction networks
...Show More Authors

View Publication
Scopus (14)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects
...Show More Authors

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A stuy Some physical properties for play (vunyl alcohol) in aquecous solution at four temperatures
...Show More Authors

The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1

View Publication Preview PDF
Publication Date
Tue Oct 13 2020
Journal Name
2020 Ieee International Conference On Mechatronics And Automation (icma)
A Robust Multi-Channel EEG Signals Preprocessing Method for Enhanced Upper Extremity Motor Imagery Decoding
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of

... Show More
View Publication
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new technique for solving fractional nonlinear equations by sumudu transform and adomian decomposition method
...Show More Authors

A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Intelligent Systems
Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
...Show More Authors
Abstract<p>This study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to</p> ... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 Ieee 56th Annual Conference On Decision And Control (cdc)
Hierarchical non-singular terminal sliding mode controller for a single link flexible joint robot manipulator
...Show More Authors

—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t

... Show More
View Publication
Scopus (11)
Crossref (10)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref