Preferred Language
Articles
/
bsj-3187
Solving Mixed Volterra - Fredholm Integral Equation (MVFIE) by Designing Neural Network
...Show More Authors

       In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.

                                 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Fractional Brownian motion inference of multivariate stochastic differential equations
...Show More Authors

Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc

... Show More
Scopus (4)
Scopus
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The market value between the two dilemmas of profit distribution and retention: an analytical study in the Iraqi stock market
...Show More Authors

Abstract:

             The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 26 2025
Journal Name
Sciences Journal Of Physical Education
Leadership patterns for university student activities managers according to the Blake and Moton model (The managerial Grid)
...Show More Authors

The researcher is one of the workers in university sports student activities, as he noticed that there is a diversity in the use of leadership patterns among managers of student activities in Iraqi universities between one director and another, which leads to the impact of these leadership styles on performance, positive or negative, in the level of human relations and the achievement of results. The researcher adopted the descriptive method in the survey method with relational relationships. The research sample consisted of (184) sports coaches who represent (27) universities and governmental and private colleges. To achieve the research objectives, the researcher used the Statistical Package for Social Sciences (Spss). To extract.statisti

... Show More
View Publication
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Neuro-Self Tuning Adaptive Controller for Non-Linear Dynamical Systems
...Show More Authors

In this paper, a self-tuning adaptive neural controller strategy for unknown nonlinear system is presented. The system considered is described by an unknown NARMA-L2 model and a feedforward neural network is used to learn the model with two stages. The first stage is learned off-line with two configuration serial-parallel model & parallel model to ensure that model output is equal to actual output of the system & to find the jacobain of the system. Which appears to be of critical importance parameter as it is used for the feedback controller and the second stage is learned on-line to modify the weights of the model in order to control the variable parameters that will occur to the system. A back propagation neural network is appl

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon May 25 2020
Journal Name
Journal Of Xi'an University Of Architecture & Technology
Iraqi Virtual Science Library (IVSL)): A field study of Iraqi researcher’s viewpoint
...Show More Authors

The aim of the research is to shed light on the stages of developing the Iraqi virtual science Library(IVSL) project, and to define its distinctive role in providing all kinds of electronic resources to researchers from professors and graduate students, to identify its contents , the entry interfaces and applications of use, and provide them through electronic portals to publishing houses, research institutions and international universities, The research sample included the teaching staff and researchers participating in educational qualification courses at the Continuing Education Center at the University of Baghdad, The research population and its sample consisted of the category of (IVSL) users, and its sample (387) users. Analysis meth

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The Impact of Cooperative Training of EFL Student Teachers on their Teaching Performance and Attitude toward Teaching
...Show More Authors

Iraqi EFL college instructors, who supervise the teaching practice of EFL student teachers, commonly experience the inefficient teaching performance of prospective teachers. This inefficiency is usually due to their inability to make connections between the practical experience and the theoretical knowledge of TEFL. One of the reasons behind this inability may be the employment of traditional ways of training and instructing student teachers. Moreover, it is usually noticed that many Iraqi EFL student teachers have a negative attitude toward the teaching profession. They explicitly state that they would join the teaching force only if they fail to work in any other field.

... Show More
View Publication Preview PDF