Preferred Language
Articles
/
2obsrYYBIXToZYALS6N-
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Momentum Ranking Function of Z-Numbers and its Application to Game Theory
...Show More Authors

After Zadeh introduced the concept of z-number scientists in various fields have shown keen interest in applying this concept in various applications. In applications of z-numbers, to compare two z-numbers, a ranking procedure is essential.  While a few ranking functions have been already proposed in the literature there is a need to evolve some more good ranking functions.  In this paper, a novel ranking function for z-numbers is proposed- "the Momentum Ranking Function"(MRF). Also, game theoretic problems where the payoff matrix elements are z-numbers are considered and the application of the momentum ranking function in such problems is demonstrated.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 15 2024
Journal Name
International Journal Of Religion
The Theory of Quantity in Measures and Scales a Comparative Jurisprudential Study
...Show More Authors

Every body has a size and mass that distinguishes it from others and makes it different from others. Some of these bodies are huge and large in size, and some are small and light in weight. Among these masses and bodies are some that are dealt with by their size and weight, each according to its quantity, weight, and cheapness. This is why they created quantities by which these weights and quantities could be estimated, so they used measures and weights for that. Objectives: The research aims to know some measures and weights, such as the wife’s maintenance, the amount of zakat, etc.I found it to be a widely spread topic, and widely used in the folds of jurisprudence. During my reading of jurisprudence books, I found jurists using many qu

... Show More
View Publication
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Development and innovation in the theory of singing   In the Umayyad era
...Show More Authors

The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
  In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).

View Publication Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Evaluation of cellular immune response in Golden Hamsters experimentally infected with Leishmania donovani comparing with cellular immune response against chicken Red Blood Cells.
...Show More Authors

The Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both infected a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (53)
Crossref (12)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using of costs based on activity that focused on performance in Reduce Costs and their reflection to improve competitive advantage: An applied research in wasitTextile and Knitting factory
...Show More Authors

The research aims mainly to the role of the statement style costs on the basis of activity based on performance (PFABC) to reduce production cost and improve the competitive advantage of economic units and industrial under the modern business environment dominated by a lot of developments and changes rapidly, which necessitates taking them and criticize them to ensure survival and continuity.  The research problem is the inability of traditional cost methods of providing useful information to the departments of units to take many administrative decisions, particularly decisions related to the product and calculating the costs of the quality of the sound and the availability of the need and the ability to replace methods capa

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control &amp; Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More