Preferred Language
Articles
/
fRijhZgBVTCNdQwCL76g
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Kinetic Model for Solute Diffusion in Liquid Membrane Systems
...Show More Authors

In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Block-Iterative Frequency-Domain Equalizations for SC-IDMA Systems
...Show More Authors

In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
25th Gis Research Uk Conference
VGI data collection for supplementing official land administration systems
...Show More Authors

This article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.

Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Molecular Biology Research Communications
Association study of two single nucleotide polymorphisms rs10757278 and rs1333049 with atherosclerosis, a case-control study from Iraq
...Show More Authors

View Publication
Scopus (2)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
مجلة البحوث والدراسات الإسلامية
Religious and Psychological guidance in the Qur’an and Sunnah, a descriptive study
...Show More Authors

God saw his servants with truth and light, and made him easy for them, and he commanded those who help them, including a counselor, guide and preacher, so if a Muslim sees deficiencies or defects, he must help him to reform and refine it. That it was in the hands of the prophets, God Almighty created the human being together straight, then melted on those scholars and researchers in all religions on psychological counseling and religious sychotherapy, stressing the importance of religious values in the process of understanding man in the process of psychotherapy and in controlling human behavior. A lot of research and studies have been published. I dealt with the religious approach in the process of treating mental disorders and the aim of

... Show More
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Using Artificial Neural Network Models For Forecasting & Comparison
...Show More Authors

The Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison for estimation methods for the autoregressive approximations
...Show More Authors

Abstract

      In this study, we compare between the autoregressive approximations (Yule-Walker equations, Least Squares , Least Squares ( forward- backword ) and Burg’s (Geometric and Harmonic ) methods, to determine the optimal approximation to the time series generated from the first - order moving Average non-invertible process, and fractionally - integrated noise process, with several values for d (d=0.15,0.25,0.35,0.45) for different sample sizes (small,median,large)for two processes . We depend on figure of merit function which proposed by author Shibata in 1980, to determine the theoretical optimal order according to min

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Comparison between the efficiency of serological tests for Identification of Brucellosis
...Show More Authors

Five serological methods for detection of Brucella were compaired in this study, Four of the methods are commonely used in the detections:- 1-Rose-Bengal: as primary screening test which depends on detecting antibodies in the blood serum. 2-IFAT: which detects IgG and IgM antibodies in the serum. 3-ELISA test: which detects IgG antibodies in the serum. 4-2ME test: which detects IgG antibodies The fifth methods. It was developed by a reasercher in one of the health centers in Baghdad. It was given the name of spot Immune Assay (SIA). Results declares that among (100) samples of patients blood, 76, 49, 49, 37, and 28. samples were positive to Rose Bengal, ELISA, SIA, 2ME and IFAT tests, respectively. When efficiency, sensitivity and specific

... Show More
View Publication Preview PDF
Crossref