Preferred Language
Articles
/
gRiPKZUBVTCNdQwCfim5
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Numerical Investigation, Error Analysis and Application of Joint Quadrature Scheme in Physical Sciences
...Show More Authors

In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.

View Publication Preview PDF
Scopus (16)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Transfer Learning and Hybrid Deep Convolutional Neural Networks Models for Autism Spectrum Disorder Classification From EEG Signals
...Show More Authors

View Publication
Scopus (13)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Sep 28 2025
Journal Name
Journal Of Physical Education
The Effect of Constructive Learning Model on Cognitive Achievement and Learning dribbling Skill in Soccer for Secondary School Students
...Show More Authors

The research aimed at identifying the effect of using constructive learning model on academic achievement and learning soccer dribbling Skill in 2nd grade secondary school students. The researcher used the experimental method on (30) secondary school students; 10 selected for pilot study, 20 were divided into two groups. The experimental group followed constructive learning model while the controlling group followed the traditional method. The experimental program lasted for eight weeks with two teaching sessions per week for each group. The data was collected and treated using SPSS to conclude the positive effect of using constructive learning model on developing academic achievement and learning soccer dribbling Skill in 2nd grade seconda

... Show More
View Publication
Publication Date
Tue Mar 03 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Administrative performance and its relationship with the cognitive style (rigidity - flexibility) for management body members of the sport clubs
...Show More Authors

Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Food Process Engineering
Artificial intelligence‐based modeling of novel non‐thermal milk pasteurization to achieve desirable color and predict quality parameters during storage
...Show More Authors
Abstract<sec><label></label><p>This study proposed using color components as artificial intelligence (AI) input to predict milk moisture and fat contents. In this sense, an adaptive neuro‐fuzzy inference system (ANFIS) was applied to milk processed by moderate electrical field‐based non‐thermal (NP) and conventional pasteurization (CP). The differences between predicted and experimental data were not significant (<italic>p</italic> > 0.05) for lightness (<italic>L</italic>*), redness‐greenness (<italic>a</italic>*), yellowness‐blueness (<italic>b</italic>*), total color differences (∆<italic>E</italic>), hue angle (<italic>h</italic></p></sec> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Ecological Engineering
Calibration and evaluation of aquacrop for maize (Zea Mays L.) under different irrigation and cultivation methods
...Show More Authors

rop simulation models play a pivotal role in evaluating irrigation management strategies to improve water use in agriculture. The aim of this study is to verify the validity of the Aquacrop model of maize under the surface and sprinkler irrigation systems, and a cultivation system, borders and furrows, and for two varieties of Maze (Fajr and Drakma) At two different sites in Iraq, Babylon and Al-Qadisiyah governorates. An experiment was conducted to evaluate the performance of the Aquacrop model in simulating canopy cover (CC), biomass (B), dry yield, harvest index (HI), and water productivity (WP). The results of RMSE, R2, MAE, d, NSE, CC, Pe indicated good results and high compatibility between measured and simulated values. The highest a

... Show More
View Publication Preview PDF
Scopus (10)
Scopus
Publication Date
Thu Jan 30 2025
Journal Name
Retos
An analytical study of the availability of comprehensive knowledge marketing management in Iraqi sports institutions
...Show More Authors

Objective: The current study aimed to prepare a measure for comprehensive knowledge marketing management. In the Iraqi sports institutions under study, identifying the extent of each dimension of comprehensive knowledge marketing management. Research methodology: This study relied on appropriate scientific methods, mainly represented by the descriptive method and the analytical method, and on the case study method because it suits the nature of the study. The study population was determined from the administrative cadres in the Iraqi Sports Federation, and the research sample numbered (86) and was represented as follows: The preparation sample numbered (50) and a percentage amounted to (58.13%), the sample of the exploratory experim

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 30 2025
Journal Name
Retos
An analytical study of the availability of comprehensive knowledge marketing management in Iraqi sports institutions
...Show More Authors

Objective: The current study aimed to prepare a measure for comprehensive knowledge marketing management. In the Iraqi sports institutions under study, identifying the extent of each dimension of comprehensive knowledge marketing management. Research methodology: This study relied on appropriate scientific methods, mainly represented by the descriptive method and the analytical method, and on the case study method because it suits the nature of the study. The study population was determined from the administrative cadres in the Iraqi Sports Federation, and the research sample numbered (86) and was represented as follows: The preparation sample numbered (50) and a percentage amounted to (58.13%), the sample of the exploratory experim

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref