Preferred Language
Articles
/
mBeCsZMBVTCNdQwCK-nP
Computer Model Application for Sorting and Grading Citrus Aurantium Using Image Processing and Artificial Neural Network
...Show More Authors
Abstract<p>This study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Grading and sorting speed recorded the highest value and was 1.38 minutes.</p>
Scopus Crossref
View Publication
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Electronic media and social issues in Algeria The podcast technique is a model
...Show More Authors

This study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Dynamics of a Fractional-Order Prey-Predator Model with Fear Effect and Harvesting
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Study of direct marketing methods and identificationThe suitability of each of them for application in the Iraqi marketAn analytical study of the views of a sample of wholesalers in Baghdad
...Show More Authors

Study of Direct Marketing techniques and determining the scope of the suitability of each of them in the application in the Iraqi market - An analytical and explorative study for sample of views for wholesaler in Baghdad. The essential idea of the research is to go into the most important concepts which have been mentioned in the direct marketing and determining its current and most important techniques and knowing the scope of applying these techniques in Baghdad main markets (Karrada, Jamilah, shorja, Baya area, zeyouna and new Baghdad) and which of those techniques most applicable in these markets. The research took a sample of (100) wholesalers who practice the activities of selling nutritional items, auto and outs spare part

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History: The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History
...Show More Authors

Abstract

The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (

... Show More
View Publication Preview PDF