Preferred Language
Articles
/
rRbGWIsBVTCNdQwCTMm4
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus
Publication Date
Fri May 01 2020
Journal Name
Iraqi Geological Journal
RESERVE ESTIMATION OF LATE MIOCENE INJANA CLAYSTONE BEDS FOR PORTLAND CEMENT AND BRICK INDUSTRY, MIDDLE OF IRAQ
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Paleostress Analysis of the Northeastern Limb of Pulkhana Anticline /NE Iraq: Implications for Arabian Plate Tectonic Evolution
...Show More Authors

Pulkhana anticline is located in Tuzhurmatu area, about 50 km SE of Kirkuk city. The study area forms a part of the Zagros Folded Zone which is situated in the unstable shelf of Iraq within the physiographic zone called Foothill Zone (in the middle of Hemrin- Makhul subzone). The north eastern limb of the anticline reaches to 50áµ’ and the dip of the  south western limb reaches to 70áµ’. The core of the structure comprises the rocks of Fat’ha Formation surrounded by rocks of Injana and Mukdadiya Formations, whereas Bai-Hasan Formation forms the slopes of the low hills surrounding the anticline. These Formations range in age from Middle Miocene to Pliocene. More than 761 readings of joint planes were collected from 20

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Inclined Magnetic Field of Non-uniform and Porous Medium Channel on Couple Stress Peristaltic Flow and application in medical treatment (Knee Arthritis)
...Show More Authors

The present study analyzes the effect of couple stress fluid (CSF) with the activity of connected inclined magnetic field (IMF) of a non-uniform channel (NUC) through a porous medium (PM), taking into account the sliding speed effect on channel walls and the effect of nonlinear particle size, applying long wavelength and low Reynolds count estimates. The mathematical expressions of axial velocity, stream function, mechanical effect and increase in pressure have been analytically determined. The effect of the physical parameter is included in the present model in the computational results. The results of this algorithm have been presented in chart form by applying the mathematical program.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Synthesis, Characterization and Application of Calcium Ion-Imprinted Polymeric Solid-Phase Extraction and Pre-Concentration in Aqueous Solutions by Packed-Bed Columns
...Show More Authors

     In this work, calcium ions were determined by the addition to the allyl chloride monomer resulting from bulk polymerization formation. To acquire the highest adsorption capacity, molar ratios of the template, monomer, and cross-linking agent, as well as solvents and multiple monomers were investigated. Scanning Electron Microscopy (SEM) and Fourier Transform Infrared Spectroscopy (FTIR) were used to analyze the calcium ion polymer. The elution of calcium had a small effect on the surfaces of the three-dimensional network structure. Calcium (II) ions were successfully eluted using a mixture of methanol and acetic acid. The calcium adsorption capacities were 3.8145 and 9.01773 mol/g (Qmax), respectively. A Langmuir isot

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
SMS Spam Detection Using Multiple Linear Regression and Extreme Learning Machines
...Show More Authors

     With the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper,  presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimum err

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref