Preferred Language
Articles
/
2RbNdIcBVTCNdQwCOkyf
Strong Fenchel Duality for Evenly Convex Optimization Problems
...Show More Authors

Among a variety of approaches introduced in the literature to establish duality theory, Fenchel duality was of great importance in convex analysis and optimization. In this paper we establish some conditions to obtain classical strong Fenchel duality for evenly convex optimization problems defined in infinite dimensional spaces. The objective function of the primal problem is a family of (possible) infinite even convex functions. The strong duality conditions we present are based on the consideration of the epigraphs of the c-conjugate of the dual objective functions and the ε-c-subdifferential of the primal objective functions.

Scopus Clarivate
View Publication
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Alienation form for ornament’s clouds in Quran
...Show More Authors

This research attend about Alienation form for ornament’s clouds in Quran, which includes four parts, the first part talks about the research problem, the researcher identified by following question :( what’s the Alienation form for ornament’s clouds in Quran?). And then the research importance. The research goal talks about Alienation form for ornament’s clouds in Quran. And also research borders, likes means objectives borders, places borders, As well as Terms Definitions, in second part talks about Theoretical framework and previous studies, includes two parts, the first one study Alienation form, meaning and understandable, the second one talks about Alienation form in Islamic arts, As well as the researcher find only one stu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Iraq's Public Budget for 2015 Ambition & challenges
...Show More Authors

One of the most critical functions of the government is the devising and planning for the Public Budget for the coming years. Studying any budget of any given state would directly reflect on its intentions and collective direction during a certain time span. Since all allocations represent the government's agenda and time plan for coming years. And the size of each allocation would measure the priority of each budgetary item. Because of the eminent importance of the public budget planning in Iraq, a country of abundant riches and human resources that flow in the national economy, we present this research that would cover the resources versus expenditures of Iraq's public budget endured by the government to sustain its various sec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Exploration of CPCD number for power graph
...Show More Authors

Recently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in  is either a pendent vertex or a support vertex and  has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Genetic Algorithm based Clustering for Intrusion Detection
...Show More Authors

Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
NEW TRENDS FOR ANGLE OF ARRIVAL ESTIMATION
...Show More Authors

View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Proceedings Of The Future Technologies Conference (ftc) 2018
Using Mouse Dynamics for Continuous User Authentication
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
New Approach for Calculate Exponential Integral Function
...Show More Authors

     This manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions

     A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods  used to calculate this function and this decision is

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Neuromorphic Architecture for the Hierarchical Temporal Memory
...Show More Authors

View Publication
Scopus (22)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Database for Baghdad Soil Using GIS Techniques
...Show More Authors

teen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel

... Show More
View Publication Preview PDF
Crossref (6)
Crossref