Preferred Language
Articles
/
VxZzPYoBVTCNdQwCQJKH
New techniques to estimate the solution of autonomous system
...Show More Authors

This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical simulation methods are compared with the standard results of the numerical method which is Runge-Kutta 4th Method from the year 2021 to 2025, using the absolute error, through comparison, it becomes clear that the approximate proposed solution is better and closer to the standard solution than the solutions of other methods that used to solve this system. The results are tabulated and represented graphically, as well as a discussion to prove the efficiency of the proposed methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system - A review article
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Design Mobile Application for Blood Donation System
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drop Interface Coalescence in Liquid-Liquid System
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
LOW COST AUTOMATIC SUN PATH TRACKING SYSTEM
...Show More Authors

Solar tracking systems used are to increase the efficiency of the solar cells have attracted the attention of
researchers recently due to the fact that the attention has been directed to the renewable energy sources. Solar tracking systems are of two types, Maximum Power Point Tracking (MPPT) and sun path tracking. Both types are studied briefly in this paper and a simple low cost sun path tracking system is designed using simple commercially available component. Measurements have been made for comparison between fixed and tracking system. The results have shown that the tracking system is effective in the sense of relatively high output power increase and low cost.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Health System in Iraq Post 2003 War
...Show More Authors

Background: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being

Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.

Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.

Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (11)
Scopus Crossref