Preferred Language
Articles
/
bsj-3190
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this study were collected and prepared to meet the requirements of network analyses within GIS. In this study, the current train stations in Iraq were analyzed and studied depending on accessibility value for those stations.  Also, to know the numbers of people who can reach those stations within a walking time of 20 minutes. So, this study aims to analyze the current train stations according to multiple criteria by using network analysis in order to find the serviced areas around those stations. Results will be presented as digital maps layers with their attribute tables that show the beneficiaries from those train stations and serviced areas around those stations depending on specific criteria, with a view to determine the size of this problem and to support the decision makers in case of locating new train stations within the best locations for it.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
مجلة الثقافة الرياضية
The Effect of Resistance Training Using Elastic Bands on the Developmentof Specific Endurance and Performance of the Oji-mata Skill
...Show More Authors

t: - Sports training in itself is a means, not an end. It is the core process that involves using exercises to provide an opportunity for athletes to perform their duties with the highest level of efficiency by developing and enhancing their capabilities and potential, using them to gain the greatest benefit for themselves and, consequently, for their team. This requires the selection of various methods and different means of training, focusing on specific physical and skill-related aspects. Therefore, training plans should take into account individual differences between players. Many researchers and experts in the field of sports in general, and combat sports in particular, emphasize the importance of having a holistic approach in the tra

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Multi-Criteria Optimization for Governmental Projects Priority Ranking Depending on Fuzzified Experts’ Opinion using Hygiene Approach
...Show More Authors

Each organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Diversity and Geographical Distribution of Sand Flies Phlebotomus papatasi (Diptera: Phlebotominae) by using Geometric Morphometric Technique from two Iraqi Provinces
...Show More Authors

            The variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished.  It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Implementation of the Coronavirus Prevention Standards (Covid-19) In the Kingdom Of Saudi Arabia (A COMPARATIVE STUDY BETWEEN FAMILIES OF PEOPLE WITH INTELLECTUAL DISABILITIES AND FAMILIES OF ORDINARY PEOPLE)
...Show More Authors

The study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use of information and communications technology to archive data: A suggested form in the Tax Audit and Examination Department of the General Tax Authority
...Show More Authors

The current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t

... Show More
View Publication Preview PDF