Preferred Language
Articles
/
QBfDNI8BVTCNdQwCSmG7
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative rate. Moreover, it surpasses the baseline methods.

Scopus Crossref
View Publication
Publication Date
Thu May 30 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical approximate solutions of random integro differential equations with laplace decomposition method
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LT

... Show More
Scopus (3)
Scopus
Publication Date
Mon Mar 31 2025
Journal Name
International Journal Of Intelligent Engineering And Systems
Generalized Joint Subcarrier-Time Index Modulation Aided Differential Chaos Shift Keying System
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Delay differential equation of the 2nd order and it's an oscillation yardstick
...Show More Authors

This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions

View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Simulation Study on Optically Designed Refractive Beam Expander for Nd: YAG Laser Harmonics for 7 Km Detection Range
...Show More Authors

The simulation study has been conducted for the harmonics of Nd: YAG laser, namely the second harmonic generation SHG, the third harmonic generation THG, and the fourth harmonic generation FHG. Determination of beam expander's expansion ratio for specific wavelength and given detection range is the key in beam expander design for determining minimum laser spot size at the target. Knowing optimum expansion ratio decreases receiving unit dimensions and increases its performance efficiency. Simulation of the above mentioned parameters is conducted for the two types of refractive beam expander, Keplerian and Galilean. Ideal refractive indices for the lenses are chosen adequately for Nd: YAG laser harmonics wavelengths, so that increasing transm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 18 2025
Journal Name
Discover Food
Analysis of the effectiveness of natural treatments for preserving apricots and the YOLOv7 application for early damage detection
...Show More Authors

Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm wa

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The evolution of demographic variables and their relationship to the demographic opportunity in Iraq and the possibility of investing
...Show More Authors

The variables of quantitative and qualitative Population role in the economic development process and it was said the human center of development and population is the goal of development and its tool , and Iraq suffers from problems in the economic growth and the standard of living and development in general, and if I want him evolution and development sectors must pay for these demographic changes especially , to study and that invest Pmaasb in the interest of the man
The study of the demographic situation in Iraq and at the provincial level to track paths demographic change and its impact on the entry of Iraq to the demographic window due to the change in the age structure of the population and how to use them and invested well in

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Depositional and Sratigraphic Evolution of the Early-Middle Miocene Succession in Hamrin, Ajeel and Mansuriyha Oil Fields, Central Iraq
...Show More Authors

The Early-Middle Miocene succession in Iraq is represented by the Serikagni, Euphrates and Dhiban formations, which deposited during the Early Miocene. The Jeribe and Fatha successions were deposited during Middle Miocene age. This study includes microfacies analysis, depositional environments, sequence stratigraphy and basin development of Early – middle Miocene in Hamrin and Ajeel oil fields and Mansuriyha Gas Field. The study area includes four boreholes in three oil fields located in central Iraq: Hamrin (Hr-2) and Ajeel (Aj-13, and 19) oil feilds, and Mansuriyha (Ms-2) Gas Field. Five facies associations were distinguished within the studied fields: deep marine, slop, platform-margin, open marine, restricted interior platform

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Comparing traditional estimators and the estimators of (PSO) algorithm for some growth models of gross domestic product in Iraq
...Show More Authors

View Publication
Scopus
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (35)
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref