Preferred Language
Articles
/
txdO9o0BVTCNdQwChipu
The possibility of adoption of hybrid cloud computing in Iraqi universities : an analytical study using technology acceptance model
...Show More Authors

الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Dialogo
The Problems of Applying Psychological, Educational and Political Measurement Instruments in light of the Prevalence of the Corona virus (Covid-19)
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
The Role of the Use of Low Molecular Weight Heparin in the Prevention of Deep Venous Thrombosis after Total Knee Arthroplasty
...Show More Authors

Background A prospective clinical study was
performed to compare the efficacy of the use of lowmolecular-
weight heparin group (enoxparin group)
with control group in the prevention of deep-vein
thrombosis after total knee arthroplasty.
Aim of the study: to assess the prevalence of DVT
after total knee arthroplasty and evaluate the
importance of the use of low molecular weight
heparin in the prevention of this DVT.
Methods Thirty-three patients undergoing total
knee arthroplasty were randomly divided into two
groups. One group consisted of 12 patients who
received no prophylaxis with an anticoagulant (the
control group), other group consisted of 21 patients
who received the low-molecular-weight h

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Plant Archive
EFFECT OF SOME GROWTH REGULATORS ON THE MULTIPLICATION AND STIMULATING THE PRODUCTION OF THE VOLATILE OIL OF ROSEMARY OFFICINALIS IN VITRO
...Show More Authors

The experiment was conducted at the plant tissue culture laboratory of the Department of Horticulture and Garden Engineering College of Agricultural Engineering Sciences, University of Baghdad, in order to study the effect of some growth regulators on propagation an stimulation production of volatile oil compounds of rosemary plant Rosmarinus officinlis using two vegetative parts (apical and lateral buds). Factorial experiment was implemented in completely randomized design with twenty replications. The results indicated that culturing the apical meristem on the medium Murashige and Skoog (MS) media with 0.5 mg.l-1 (BA) with 0.1 mg.l-1 of NAA gave the highest response rate of 100%. As for the doubling stage, the levels of BAA and IAA (Indol

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Species diversity of <i>Fusarim</i> fungi on grain crops in the conditions of the foothill zone of the Central Caucasus
...Show More Authors

The article presents the results of studies of the species composition of phytopathogens of winter soft wheat grain affected by ear fusarium. For the first time, studies were conducted using a complex of electron microscopic, molecular genetics, and mycological methods. The species F. graminearum dominated in all samples (frequency of occurrence 42.8%). The species F. avenaceum (23.3%), F. sporotrichioides and F. equiseti (8.8% each) were noted with high frequency. Next in descending order of frequency of occurrence: F. oxysporum, F. boothii, F. poae, F. proliferatum, F. accumatum, F. incarnatum, F. vorosii, F. tricinctum, F. cerealis, F. sambuticum. For the first time, 7 species were found for the plain zone of the Pre-Caucasus: F.

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref