Preferred Language
Articles
/
qBccNo8BVTCNdQwCx2I-
Gene Expression Analysis via Spatial Clustering and Evaluation Indexing
...Show More Authors

The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the traditional number of clustering, K-mean particle swarm optimization (PSO), and Grey–Wolf optimization (GWO). This method offers high performance for improvement. The DBSCAN algorithm also offers better results of clusters and gives better performance assessment according to the results shown in this study.

Scopus Crossref
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Technical analysis of the salary scale for public sector employees
...Show More Authors

            The research discusses the mechanism for analyzing the salary scale in the public sector through an analysis of grades, their stages, occupants and their financial entitlements, and the extent to which the information obtained for their investment in strategic planning, conducting correction and treatment can be used. The salaries of the employees in them, whose number is (1117) employees, to be a field of research, as the salary structure in it for the year 2019 was analyzed by relying on a number of statistical tools in the analysis process, including the arithmetic circles, upper limits, minimum limits and percentage, and with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
The Microfacies Analysis of Mishrif Formation in Gharraf Oil Field
...Show More Authors

Six main microfacies are identified which are Lime Mudstone, Bioclastic Wackeston, Bioclastic Packstone-Wackestone, Bioclastic Wackestone- Mudestone, Pelagic Mudstone–Wackestone, Bioclastic Packstone -Grainston Microfacies in addition to their associated depositional environment. The diagenesis process have affected the Mishrif rocks and played a role in deteriorating reservoir porosity in well Ga-2 and enhancing it in well Ga1,3.These processes include: cementation, micritization, recrystallization,dissolution,compaction pressure solution and dolomitization.

View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Petrophysical Analysis of an Iraqi Gas Field (Mansuriya Gas Field)
...Show More Authors

Mansuriya Gas field is an elongated anticlinal structure aligned from NW to SE, about 25 km long and 5-6 km wide. Jeribe formation is considered the main reservoir where it contains condensate fluid and has a uniform thickness of about 60 m. The reservoir is significantly over-pressured, (TPOC, 2014).

This research is about well logs analysis, which involves the determination of Archie petrophysical parameters, water saturation, porosity, permeability and lithology. The interpretations and cross plots are done using Interactive Petrophysics (IP) V3.5 software.

The rock parameters (a, m and n) values are important in determining the water saturation where (m) can be calcul

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Thermal Performance Analysis of Compact Heat Exchangers for Thermoelectric Generators
...Show More Authors

The efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Stratigraphic Analysis of Gercus Formation in Dohuk area, Northern Iraq
...Show More Authors

A surface section of the Gercus Formation (Middle-Late Eocene) was studied in Berafat area, Dohuk Governorate, Northern Iraq. The Gercus Formation consists of a mixed siliciclastic sediments, evaporates and carbonate sequences in the studied region, predominantly in the upper and middle parts. Nevertheless, it usually consists of upward-fining carbonate-rich sandstone cyclothems, marl, conglomerate and siltstone along with a gypsum lens and thin micrite carbonate beds.  The Gercus Formation was deposited in delta and delta front of occasionally depositional environment which is represented by red-brown claystone and reddish-brown mudstone lithofacies. Cross bedded  pebbly sandstone, trough cross-bedded sandstone  and lamin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF