Preferred Language
Articles
/
1BemT5MBVTCNdQwCNdDB
Performance measurements of single server fuzzy queues with unreliable server using left and right method
...Show More Authors

The fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely developing an optimal solution (Opt. Sol.) depending on the corresponding path by the new tender algorithm.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Oct 18 2015
Journal Name
International Journal Of Pure And Applied Mathematics
A MODIFIED FUZZY MULTI-OBJECTIVE LINEAR PROGRAMMING TO SOLVE AGGREGATE PRODUCTION PLANNING
...Show More Authors

This paper develops a fuzzy multi-objective model for solving aggregate production planning problems that contain multiple products and multiple periods in uncertain environments. We seek to minimize total production cost and total labor cost. We adopted a new method that utilizes a Zimmermans approach to determine the tolerance and aspiration levels. The actual performance of an industrial company was used to prove the feasibility of the proposed model. The proposed model shows that the method is useful, generalizable, and can be applied to APP problems with other parameters.

View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
An Approximated Solutions for nth Order Linear Delay Integro-Differential Equations of Convolution Type Using B-Spline Functions and Weddle Method
...Show More Authors

The paper is devoted to solve nth order linear delay integro-differential equations of convolution type (DIDE's-CT) using collocation method with the aid of B-spline functions. A new algorithm with the aid of Matlab language is derived to treat numerically three types (retarded, neutral and mixed) of nth order linear DIDE's-CT using B-spline functions and Weddle rule for calculating the required integrals for these equations. Comparison between approximated and exact results has been given in test examples with suitable graphing for every example for solving three types of linear DIDE's-CT of different orders for conciliated the accuracy of the results of the proposed method.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 28 2024
Journal Name
Asia-pacific Journal Of Molecular Biology And Biotechnology
A novel method for the degradation of human blood clot by immobilised bromelain using multi-walled carbon nanotube and polyphenol oxidase
...Show More Authors

Pathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 21 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Study the Effect of Using Google Classroom on the Academic Performance Under the Covid19 Pandemic Using Data Mining Technique
...Show More Authors

— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improve Performance of Solar Cell by using Grooves which Have Semicircular Shape on The Surface by using Program (ZEMAX)
...Show More Authors

 In this work silicon solar cell has been used with semicircular grooves to improve its efficiency by reducing reflection of rays and increasing optical path through the cell. Software program for optical design (zemax) has been used by ray tracing mode to evaluate prototype efficiency when using detector beneath the cell. The prototype has aspect ratio (A.R=0.2) which is the best efficiency at incident angle (Ï´=0ͦ) and the best acceptance angle (Ï´=50ͦ). 

View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Novel Single Nucleotide Polymorphism of Interleukin-10 Gene is Linked to Type 2 Diabetes Mellitus in Iraqi Patients with Toxoplasmosis(Conference Paper )#
...Show More Authors

Type 2 diabetes mellitus (T2DM) is a chronic disorder that is a serious health concern all over the globe, it is linked to Interleukin-10 (IL-10) single nucleotide polymorphisms (SNPs) at the promoter region. On the other hand, diabetes influences the cellular and humoral immunity predisposing the patient to a variety of opportunistic parasites one of them is Toxoplasma gondii (T. gondii), which may infect any nucleated cell, including pancreatic cells. The purpose of this research was to explore the association of IL-10 genetic polymorphisms with T2DM and latent toxoplasmosis among Iraqi patients with T2DM. Fifty-five and fifty-eight venous blood samples were taken from T2DM patients and age-matched non-diabetic person

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref