Preferred Language
Articles
/
joe-2261
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum method and Modified 2D-Checksum. In 2D-checksum method, summing process was done for 7×7 patterns in row direction and then in column direction to result 8×8 patterns. While in modified method, an additional parity diagonal vector was added to the pattern to be 8×9. By combining the benefits of using single parity (detecting odd number of error bits) and the benefits of checksum (reducing the effect of 4-bit errors) and combining them in 2D shape, the detection process was improved. By contaminating any sample of data with up to 33% of noise (change 0 to 1 and vice versa), the detecting process in first method was improved by approximately 50% compared to the ordinary traditional two dimensional-parity method and gives best detection results in second novel method 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Fri Jan 31 2020
Journal Name
Iraqi Geological Journal
ESTIMATION OF SHEAR WAVE VELOCITY FROM WIRELINE LOGS DATA FOR AMARA OILFIELD, MISHRIF FORMATION, SOUTHERN IRAQ
...Show More Authors

Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity fr

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Studies In Systems, Decision And Control
The Effect of Using an Accounting Information System Based on Artificial Intelligence in Detecting Earnings Management to Enhance the Sustainability of Economic Units
...Show More Authors

This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Modified BFGS Update (H-Version) Based on the Determinant Property of Inverse of Hessian Matrix for Unconstrained Optimization
...Show More Authors

The study presents the modification of the Broyden-Flecher-Goldfarb-Shanno (BFGS) update (H-Version) based on the determinant property of inverse of Hessian matrix (second derivative of the objective function), via updating of the vector s ( the difference between the next solution and the current solution), such that the determinant of the next inverse of Hessian matrix is equal to the determinant of the current inverse of Hessian matrix at every iteration. Moreover, the sequence of inverse of Hessian matrix generated by the method would never  approach a near-singular matrix, such that the program would never break before the minimum value of the objective function is obtained. Moreover, the new modification of BFGS update (H-vers

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Nov 22 2021
Journal Name
Key Engineering Materials
Experimental Evaluation of Moisture Damage and Rutting Resistance for SBS Modified Warm Mix Asphalt Incorporating Recycled Asphalt Concrete
...Show More Authors

The efforts embedded in this paper have been devoted to designing, preparing, and testing warm mix asphalt (WMA) mixtures and comparing their behavior against traditional hot mix asphalt mixtures. For WMA preparation, the Sasobit wax additive has been added to a 40/50 asphalt binder with a concentration of 3%. An experimental evaluation has been performed by conducting the Marshall together with volumetric properties, indirect tensile strength, and wheel tracking tests to acquire the tensile strength ratio (TSR), retained stability index (RSI), and rut depth. It was found that the gained benefit of reduction in mixing and compaction temperatures was reversely associated with a noticeable decline in Marshall properties and moisture s

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 29 2026
Journal Name
Journal Of Interdisciplinary Mathematics
Efficient design of neural network based on modified LM training algorithm for solving nonlinear 4th order 3D-PDEs 
...Show More Authors

Authors in this work design efficient neural networks, which are based on the modified Levenberg - Marquardt (LM) training algorithms to solve non-linear fourth - order three -dimensional partial differential equations in the two kinds in the periodic and in the non-periodic - Periodic. Software reliability growth models are essential tools for monitoring and evaluating the evolution of software reliability. Software defect detection events that occur during testing and operation are often treated as counting processes in many current models. However, when working with large software systems, the error detection process should be viewed as a random process with a continuous state space, since the number of faults found during testin

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Journal Of Electronic Materials
Influence of Dry and Wet Etching on AlInSb Contact Resistivity, Transfer Length, and Sheet Resistance Using Circular Transmission Model
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref