Preferred Language
Articles
/
PBdllY4BVTCNdQwCq1Wc
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Estimation the reliability function of multi state system by using Direct Partial Logic Derivative
...Show More Authors

In this research is estimated the function of reliability dynamic of multi state systems  and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Sensors
A Novel Application of Deep Learning (Convolutional Neural Network) for Traumatic Spinal Cord Injury Classification Using Automatically Learned Features of EMG Signal
...Show More Authors

In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi

... Show More
View Publication
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Generalization of Gamma and Beta Functions with Certain Properties and Statistical Application
...Show More Authors

     This work is devoted to define new generalized gamma and beta functions involving the recently suggested seven-parameter Mittag-Leffler function, followed by a review of all related special cases. In addition, necessary investigations are affirmed for the new generalized beta function, including, Mellin transform, differential formulas, integral representations, and essential summation relations. Furthermore, crucial statistical application has been realized for the new generalized beta function.  

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
International Journal Of Computer Mathematics
Numerical solution of the two-dimensional Helmholtz equation with variable coefficients by the radial integration boundary integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref