Preferred Language
Articles
/
AxbB04cBVTCNdQwCBWlS
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

Crossref
View Publication
Publication Date
Mon Mar 31 2025
Journal Name
Iraqi Statisticians Journal
Hypothesis Testing for Non-Normal Multiple Compact Regression Model
...Show More Authors

Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of data content analysis (DEA) technology to evaluate performance efficiency: applied research in the General Tax Authority
...Show More Authors

The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
The Position of the Oil Press about the World Oil Industry / OAPEC Bulletin 2011-2012 as a Model
...Show More Authors

This research deals with the attitude of oil press towards oil industry in the world and the extent of their concerns with the stages of oil industry relating to the abundance of oil and natural gas, as it is an international strategic and complementary industry. The researcher uses the survey method for content analysis of the initial article and the press news for two: years (2011-2012). The results if the study are as follows
1- Oil press is concerned with developing and the stages of the Arabic oil industry in the interest of OAPEC in the first place.
2- It is concerned with exploring, extracting, and marketing oil in the first place, then with refining operations in refineries and petrochemical plants in the second place, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Mosaic art as a cultural decorative aspect and contemporary mosaic re-employment: محمد طلال عبد آل عبد الله
...Show More Authors
  • Islamic art is applied art that searches for everything that is useful and beneficial and Both are properties of Islamic art. Islamic art has many well-established elements and styles and pictures that distinguish it from the rest of the arts among those elements and methods that were used in the architectural cladding artwork Or mosaic murals and mosaic was known in its first form in Babylon in a primitive style similar to it, but the Muslim artist in the era of the Caliphs made the art of mosaic In mosques and palaces.
    Chapter one: This chapter is concerned with introducing the art of mosaic historically and focusing on it.
    Chapter Two: This chapter deals with contemporary Islamic mosaics, especially in Mecca
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
THE IRAQI MEDIA FROM APRIL 2003 TO APRIL 2005
...Show More Authors

After the fall of the Iraqi regime in the 9th of April 2003, and after the disintegration of the country, political and party political chaos that had never been witnessed before, has now taken over. In the past 2 years, the American military forces had a primary role in spreading this chaos and disorder by applying a set of wrong measures and policies. This chaos that is still affecting the iraqi people was completely ignored by the USA even 2 years after the occupation, no serious steps have been taken in order to bring back order and security, on the other hand, most of the government institutions and its forces were disintegrated, along with the decision made by Paul Bremer of dismissing all the iraqi journals and the workers of the

... Show More
View Publication Preview PDF
Crossref