Preferred Language
Articles
/
OBaYi4cBVTCNdQwC_VW0
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jun 04 2024
Journal Name
Int. J. Operational Research
Pascal’s triangle graded mean defuzzification approach for solving fuzzy assignment models by using pentagonal fuzzy numbers
...Show More Authors

The fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal’s triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely deve

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Heliyon
Removal of amoxicillin from contaminated water using modified bentonite as a reactive material
...Show More Authors

This study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi

... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Investigation of the Baryonic Mass Tully–Fisher Relationship for Normal and Barred Spiral Galaxies
...Show More Authors

     In this study, the stellar mass M*(LB) and the atomic gas mass MHI (LB) were utilized to evaluate the baryonic mass Tully–Fisher (Mb) of disc system spiral galaxies (for normal spiral and barred spirals) and to obtain an empirical relation between masses Mb, MHI, M* and optical luminosity at blue range LB. The data for the studied sample was collected from literature papers for unbarred (normal) and barred-type morphological spiral galaxies. Therefore, in this work, the sample of data was chosen to analyze the baryonic mass Tully–Fisher relationship for normal and barred spiral galaxies. Statistical analysis of the connections was used between the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (26)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Complete Rectal Prolapse
...Show More Authors

Background and Objective:
There are many treatment modalities in managing complete rectal prolapse (CRP) current study present simple technique of cauterization plication operation in the treatment
of complete rectal prolapse.
Methods:
The study include 30 patients present with CRP their mean age (74.3 ± 4.6), 19 females and 11 males. With the patient under- general anesthesia in litliotomy position the
proolapsed rectum pulled outside the anal canal, the mucosa was cauterized, the muscle layer was plicated by 2/0 dixon suture. Posterior levtorplasty were done in 10 adult patients
when it is indicated.
Results:
The postoperative follow up was 12-24 months. Six had postoperative mucosal prolaps

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN
...Show More Authors

Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving ener

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref