Preferred Language
Articles
/
kxZOSIcBVTCNdQwCi0Fs
Osteoporosis effect on posterior mandible in preimplanted area for postmenopausal females using cone-beam computed tomography
...Show More Authors

Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluating the effects of reservoir level and foundation depth on the dynamic behaviour of a rockfill dam using three-dimensional finite elements modelling
...Show More Authors
Abstract<p>This paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Insects Infestation for Plants of Fabaceae in Different Areas in Iraq
...Show More Authors
Abstract<p>In this study, 191 specimens of insects that infect species of the Fabaceae family, including: <italic>Pisum sativum</italic> L. (1753), <italic>Lens esculenta</italic> Moench (1794) and <italic>Vigna unguiculata</italic> subsp. <italic>sesquipedalis</italic> (L.) Verdc. (1763), <italic>Vicia faba</italic> L. (1753), <italic>Phaseolus vulgaris</italic> L. (1753), <italic>Medicago sativa</italic> L. (1753), <italic>Trifolium campestre</italic> Schreb. (1804), were collected from four governorates: Baghdad, Karbala, Wasit, and Anbar. Four orders, five families, 17 species belonging to 10 genera have been ide</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt / Egyptology
&quot;Guarantees of Disciplinary Punishment on University Service Employee and Mechanisms for their Cancellation&quot; Comparative study
...Show More Authors

The university Service employee is considered one of the categories of public employees, However, The academic and administrative tasks duties that undertakes have made him a special importance and a distinguished legal status, Therefore, we find That the Iraqi legislatures assigned this category a special Law, it is the university Service law No (23) of 2008 as amended who dealt with some aspects related to serving this category, such as duties, right, condition for appointment and award of academic titles, and financial allocation, such as university service allocation, academic title allocations, and some other Provisions leaving other matters to the general service laws and employee discipline, among the matters that the legislator negl

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations
...Show More Authors

        In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using  Mathcad 15.and graphic in Matlab R2015a.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The importance of direct foreign investment on development of Iraqi oil industry for the period (2003-3010)
...Show More Authors

Oil industry played a major role in delineating the course and type o development in both imported and exported Arabic countries alike where its revenues has perform an essential role in forming programs and plans of development on both national and international level in addition to anticipation of future consuming.

Iraq, as an oil producer country with a revenues –based economy depends on oil in building its economy totally including its infrastructure having a the greatest conformed reservoir which make the government budget depends largely on oil revenues where its strategic importance lies in funding all aspects of expenders as it is considered the prime source of foreign currency.  The chall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref