Preferred Language
Articles
/
vRfupo0BVTCNdQwCeBdd
Granular computing approach for the design of medical data classification systems
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Iconic Form in Modern Graphic Design: علي محمد شواي غدير
...Show More Authors

The graphic field invests the visual space then shows the shape by all means of expression that have a certain meaning. The research is interested in studying the iconic form in the modern graphic design through investing names and flags and the extent of their action in the social life and invest them from one to another looked at from viewpoint of trading and consumption and investing their wide popularity. The study problem is manifested in the following question:
1- Does the iconic form help in ad circulation?
The importance of the research lies in the following:
1- Reading the visual iconic form through deciphering its current symbols. The form combines a concept and a case or a form and meaning.

The theoretical fra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital modeling and its technical variables in contemporary interior design
...Show More Authors

The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Design privacy in contemporary ceramic art sculpture: نزار جواد الزبيدي
...Show More Authors

The importance of this research came through the question: Are there a privacy in the design in the ceramic arts, what are they? What are the basis of design for the ceramic art sculptures?The study refers to the design privacy in the contemporary ceramic arts, not as a serviceable art, but the art of being a dialectic collecting the arts across the craft and compositionThis research is the first study to look at the privacy of design and the connection with the formation of the large sizes ceramic art sculptures, and what they have as privacy of design and the way of formations.To highlight on the most prominent technical problems facing the ceramist in the production of so sculptural worksThe need for the study comes to help the worker

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 06 2004
Journal Name
Iraqi Journal Of Science
Cluster and factor analyses R and Q mode technique of geochemical and petrological data of the Shalair Metamorphic Rock Group, Shalair Valley area, Northeastern Iraq
...Show More Authors

Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrosorption of Hexavalent Chromium Ions by MnO2/Carbon Fiber Composite Electrode: Analysis and Optimization of the Process by Box-Behnken Design
...Show More Authors

A nano manganese dioxide (MnO2) was electrodeposited galvanostatically onto a carbon fiber (CF) surface using the simple method of anodic electrodeposition. The composite electrode was characterized by field emission scanning electron microscopy (FESEM), and X-ray diffraction (XRD). Very few studies investigated the efficiency of this electrode for heavy metals removal, especially chromium. The electrosorption properties of the nano MnO2/CF electrode were examined by removing Cr(VI) ions from aqueous solutions. NaCl concentration, pH, and cell voltage were studied and optimized using the Box-Behnken design (BDD) to investigate their effects and interactions on the electrosorption process. The results showed that the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دور تنقيب البيانات Data Mining في زيادة أداء المنظمة (( دراسة تحليلية في المصرف الصناعي ))
...Show More Authors

تمهيد

غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.

ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Statistical Applications In Genetics And Molecular Biology
Mixture model-based association analysis with case-control data in genome wide association studies
...Show More Authors
Abstract<p>Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref