Preferred Language
Articles
/
1xYFBYcBVTCNdQwCMC3d
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the initial value of the KP parameter. In addition, a new diagonal recurrence relation is introduced and used in the proposed algorithm. The diagonal recurrence algorithm was derived from the existing n direction and x direction recurrence algorithms. The diagonal and existing recurrence algorithms were subsequently exploited to compute the KP coefficients. First, the KP coefficients were computed for one partition after dividing the KP plane into four. To compute the KP coefficients in the other partitions, the symmetry relations were exploited. The performance evaluation of the proposed recurrence algorithm was determined through different comparisons which were carried out in state-of-the-art works in terms of reconstruction error, polynomial size, and computation cost. The obtained results indicate that the proposed algorithm is reliable and computes lesser coefficients when compared to the existing algorithms across wide ranges of parameter values of p and polynomial sizes N. The results also show that the improvement ratio of the computed coefficients ranges from 18.64% to 81.55% in comparison to the existing algorithms. Besides this, the proposed algorithm can generate polynomials of an order ∼8.5 times larger than those generated using state-of-the-art algorithms.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Nanosecond laser pulses for aluminum and copper drilling
...Show More Authors

Nd:YAG laser pulses of 9 nanosecond pulse duration and operating wavelength at 1.06 μm, were utilized to drill high thermal conductivity and high reflectivity aluminum and copper foils. The results showed a dependence of drilled holes characteristics on laser power density and the number of laser pulses used. Drilled depth of 74 ϻm was obtained in aluminum at 11.036×108 W/cm2 of laser power density. Due to its higher melting point, copper required higher laser power density and/or larger number of laser pulses to melt, and a maximum depth of 25 μm was reached at 13.46×108 W/cm2 using single laser pulse.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Early Laparoscopic Versus Open Cholecystectomy for Acute Cholecystitis
...Show More Authors

Background: Acute cholecystitis is common surgical
problem, which was treated previously by conservative
treatment .Later early open has been introduced as an
alternative to interval for treatment of acute cholecystitis.
Early open was found to be a safe, successful with
comparable postoperative complication rate. With the
advent of laparoscopy laparoscopic have been used for
chronic cholecystitis and became the first line of
treatment. New reports have shown that laparoscopic can
be used as an alternative to open for surgical treatment of
acute cholecystitis.
Objectives: to compare the success, safety of early
laparoscopic versus early open as a primary treatment of
acute cholecystitis.
Methods:

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
ANALYSIS UNBALANCED FACTORIAL EXPERIMENTS FOR THE RICE CROP
...Show More Authors

Abstract:

           The great importance that distinguish these factorial experiments made ​​them subject a desirable for use and application in many fields, particularly in the field of agriculture, which is considered the broad area for experimental designs applications.

            And the second case for the factorial  experiment, which faces researchers have great difficulty in dealing with the case unbalance we mean that frequencies treatments factorial  are not equal meaning (that is allocated a number unequal of blocks or units experimental per tre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Quality of Life for Adult Patients
...Show More Authors

Objective: The study aimed to determine quality of life domains for adult patients with limbs loss and to identify
the association between quality of life domains and demographic characteristics and medical information.
Methodology: A descriptive study was carried out at Baghdad artificial limb center, Al-Salam medical
rehabilitation center, Al-Ghadeer medical rehabilitation center and the rheumatoid and medical rehabilitation
center for the period from September 2007 to April 2008. A purposive ''non- probability'' sample of (200)
patients with limbs loss. Questionnaire form was constructed for the purpose of the study. Data were collected
through the application of the questionnaire and interview technique. Data were a

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
2014 Ieee 25th Annual International Symposium On Personal, Indoor, And Mobile Radio Communication (pimrc)
Percolation condition for interference-limited cognitive radio networks
...Show More Authors

In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Fractal and its implications for industrial product design
...Show More Authors

The current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Applied Sciences
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
...Show More Authors

Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Aug 15 2015
Journal Name
Iraqi Dental Journal
Standardized Protocol for Endodontic Treatment (Iraqi Endodontic Society)
...Show More Authors

The establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS
...Show More Authors

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
View Publication
Crossref (1)
Crossref