Preferred Language
Articles
/
bsj-1547
An Approximated Solutions for nth Order Linear Delay Integro-Differential Equations of Convolution Type Using B-Spline Functions and Weddle Method
...Show More Authors

The paper is devoted to solve nth order linear delay integro-differential equations of convolution type (DIDE's-CT) using collocation method with the aid of B-spline functions. A new algorithm with the aid of Matlab language is derived to treat numerically three types (retarded, neutral and mixed) of nth order linear DIDE's-CT using B-spline functions and Weddle rule for calculating the required integrals for these equations. Comparison between approximated and exact results has been given in test examples with suitable graphing for every example for solving three types of linear DIDE's-CT of different orders for conciliated the accuracy of the results of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Forecasting The Wet and Dry Rainy Seasons in Mosul Using Standardized Precipitation Index (SPI)
...Show More Authors

Iraq suffers the continuing lack of water resources in generdwether it is surface or underearth water or rain. The study of rain has got the utmost importance in order to the rain direction in Iraq and in Mosul in particular and what it will be in future. It also shows the wet as well as the dry seasons and the possibility of expecting them and expecting their quantities in order to invest them and to keep this vital resource The research deals with predict the wet and dry rainy seasons in Mosul using (SPI) Standardized precipitation index extracted from conversion of Gamma distribution to standardized normal distribution , depending on data of monthly rain amounts for 1940-2013 . Results showed existence of 31 w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Nov 27 2023
Journal Name
Journal Of Periodontal Research
Ability of gingival crevicular fluid volume, E‐cadherin, and total antioxidant capacity levels for predicting outcomes of nonsurgical periodontal therapy for periodontitis patients
...Show More Authors
Abstract<sec><title>Objectives

To determine the potential of gingival crevicular fluid (GCF) volume, E‐cadherin and total antioxidant capacity (TAC) levels to predict the outcomes of nonsurgical periodontal therapy (NSPT) for periodontitis patients.

Background

NSPT is the gold‐standard treatment for periodontal pockets < 6 mm in depth, however, successful outcomes are not always guaranteed due to several factors. Periodontitis‐associated tissue destruction is evidenced by the increased level of soluble E‐cadherin and reduced antioxidants in oral fluids which could be used as predictors for success/failure of N

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Problem of International Finance and Efficiency of Local Savings in Financing for Development in Algeria: Standard study for the period (1970-2014)
...Show More Authors

      The aim of this study is to investigate the nature of the relationship between domestic savings and domestic investment, or rather the efficiency of domestic savings in financing development in Algeria, in order to explain this relationship, identify the challenges to investment, and finance and accelerate economic growth. The economic measurement methodology has estimated the relationship between the savings rate and the local investment rate in the Algerian economy. We have annual data for the period 1970-2014. One of the most important conclusions is that there is no relationship between savings and investment, nor even an integration between them. To illustrate this, the use of some statistical tools, a

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 02 2024
Journal Name
Journal Of The American Oil Chemists' Society
Direct application of tungstosilicic acid hydrate for the treatment of high free fatty acid in acidic crude palm oil and for biodiesel production
...Show More Authors
Abstract<p>This study explored the use of industrial acidic crude palm oil (ACPO) for biodiesel production, facing a significant obstacle due to its high free fatty acid (FFA) content, which complicates the biodiesel production process. Typically, esterification is employed to convert FFAs into fatty acid methyl ester (FAME). Herein, the effectiveness of tungstosilicic acid hydrate (TSAH) as an unsupported heteropoly acid (HPA) catalyst for FFA esterification in ACPO was investigated. The FFA content was reduced from 8.43% to 0.95% under optimum conditions (4 wt% catalyst dosage, a methanol to oil molar ratio of 10:1, 150 min and a temperature of 60°C). Noteworthy, the TSAH catalyst showed stability over 7</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More