Preferred Language
Articles
/
7xfCM48BVTCNdQwC_2Ci
Developing Bulk Arrival Queuing Models with Constant Batch Policy Under Uncertainty Data Using (0-1) Variables
...Show More Authors

This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional bulk queues. This new model focus on mixed-integer non-linear programming (MINLP) tenders a mathematical computational approach is known as (0 -1) variables. To measure the efficiency of the method, the efficient solution strategy plays a crucial role in the adequate application of these techniques. Furthermore, different stages of the α-cut intervals were analyzed and the final part of the article gives a numerical solution of the proposed model to achieve practical issues.

Publication Date
Sun Jan 01 2023
Journal Name
2nd International Conference On Mathematical Techniques And Applications: Icmta2021
Review of clustering for gene expression data
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetics Contents of Data Visualization as an Input to its humanization
...Show More Authors

The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 11 2025
Journal Name
Journal Of The College Of Basic Education
The effect of rehabilitation exercises with different resistances in the water medium according to some variables and biomechanics in restoring the flexibility and strength of the thigh muscles for those with knee roughness
...Show More Authors

It included the introduction to the research and its importance, as the knee joint is one of the important joints in the human body that are susceptible to injury, and among these injuries is the roughness of the knee that occurs as a result of weakness and imbalance in the work of the quadriceps muscle, so its treatment is through rehabilitation exercises to treat weakness and gain flexibility and strength.Hence the importance of the research by developing rehabilitation exercises with different resistances in the water medium and restoring flexibility and muscular strength for patients with knee roughness for ages from 30-40 years, and the experimental method was used to solve the research problem, and the research sample included (6) of

... Show More
View Publication
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Alexandria Engineering Journal
Batch and continuous study of one-step sustainable green graphene sand hybrid synthesized from Date-syrup for remediation of contaminated groundwater
...Show More Authors

Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Complete Classification of Degree 7 for Genus 1
...Show More Authors

Assume that  is a meromorphic fuction of degree n where X is compact Riemann surface of genus g. The meromorphic function gives a branched cover of the compact Riemann surface X. Classes of such covers are in one to one correspondence with conjugacy classes of r-tuples (  of permutations in the symmetric group , in which  and s generate a transitive subgroup G of  This work is a contribution to the classification of all primitive groups of degree 7, where X is of genus one.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological social conflict and its relation with family parental style for adolescences from the intermediate stage student at governmental Hail school, in the light of economical levels and sex variables .KSA
...Show More Authors

The current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
An Application of Data Mining Algorithms for Analyzing Psychological Researches
...Show More Authors

     Computer science has evolved to become the basis for evolution and entered into all areas of life where the use of computer has been developed in all scientific, military, commercial and health institutions. In addition, it has been applied in residential and industrial projects due to the high capacity and ability to achieve goals in a shorter time and less effort. In this research, the computer, its branches, and algorithms will be invested in the psychological field. In general, in psychological fields, a questionnaire model is created according to the requirements of the research topic. The model contains many questions that are answered by the individuals of the sample space chosen by the researcher. Often,

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref