Preferred Language
Articles
/
5BZldIcBVTCNdQwCu0sO
Fuzzy preinvexity via ranking value functions with applications to fuzzy optimization problems
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Applied Numerical Mathematics
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

View Publication
Scopus (28)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The development of imaginal thinking and its relation with adults' problems
...Show More Authors

The behavior of thinking is consider one of the modern concepts that appear in the last 20 years, this concept has attracted the attention of psychologists and researchers for thinking has a great role in many fields like teaching ,educational,economical,cultural and social fields.
One of thinking manner is imaginal thinking that has a great role in human civilization. imaginal thinking lead to innovation ,poems, inventions and arts. imaginal thinkingled to highscores in talented schools by escalating their thinking range and solving problems that consider one of organized and free assumption thinking.
The development of problems thinking strategies reflect the development of organized brain process ability.
That studies assumes

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 28 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Psychological and sexual problems among women with hysterectomy at Baghdad City
...Show More Authors

Hysterectomy is one of the most common gynecological operations done worldwide. Early diagnosis of the psychosexual effects of a hysterectomy and the fast application of appropriate treatment can prevent further worsening and persistence of symptoms, especially with respect to higher levels of anxiety, depression, lower self-esteem, and sexual impact after a hysterectomy. The aim of this study was to assess the psychological and sexual problems of women with hysterectomy. A descriptive study was carried out from March 1, 2023 to May 25, 2023 to determine the level of psychosexual problems experienced by women after hysterectomy. A purposive (non-probability) sample of 120 women who visited the outpatient clinic at Baghdad Teaching H

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF
Publication Date
Fri Aug 06 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Versatile Applications of Complexes with Some Lanthanide Elements: A Review
...Show More Authors

Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexe

... Show More
Publication Date
Tue Dec 01 2015
Journal Name
Chemical Engineering Science
Airlift bioreactor for biological applications with microbubble mediated transport processes
...Show More Authors

View Publication
Scopus (100)
Crossref (90)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem
...Show More Authors

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co

... Show More
View Publication Preview PDF
Crossref