Preferred Language
Articles
/
jxbhCocBVTCNdQwCeDId
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Wed Jul 24 2024
Journal Name
An International Journal Of Optimization And Control: Theories & Applications (ijocta)
The effect of a psychological scare on the dynamics of the tumor-immune interaction with optimal control strategy
...Show More Authors

Contracting cancer typically induces a state of terror among the individuals who are affected. Exploring how chemotherapy and anxiety work together to affect the speed at which cancer cells multiply and the immune system’s response model is necessary to come up with ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological scare and chemotherapy on the interaction of cancer and immunity. The proposed model is accurately described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish three equilibrium positions. The stability analysis reveals that all equilibrium points consi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a strategy (fahs) in the development of grammar skills of a sample of secondary school Female Students in Saudi Arabia
...Show More Authors

The aim of the present research is to measure the degree of strategic effectiveness (fahs) in the development of grammar skills of high school students in the Kingdom of Saudi Arabia and to achieve the goal of the researcher the researcher used the semi-experimental approach; On ten arbitrators specializing in grammar, morphology, curricula and methods of teaching the Arabic language. After confirming the validity of the guideline, the researcher prepared an achievement test consisting of (22) paragraphs of the type of short answer and multiple choice. The researcher trained a teacher to apply the strategy to the experimental research sample using the (screening) component of (30) students, and the same parameter taught the control sampl

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Egyptian Journal Of Botany
Molecular data unravels three freshwater peridinioids in the Baghdad Island Tourist Lake, with reporting Palatinus apiculatus (Peridiniopsidaceae, Peridiniales) as a new record for the Iraqi algal flora
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref