Preferred Language
Articles
/
bsj-3187
Solving Mixed Volterra - Fredholm Integral Equation (MVFIE) by Designing Neural Network
...Show More Authors

       In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.

                                 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
International Journal Of Novel Research In Electrical And Mechanical Engineering
Use of Panel Method in High Subsonic and Transonic Aerodynamic Analysis of Complex Aircraft Configuration
...Show More Authors

The application of low order panel method with the Dirichlet boundary condition on complex aircraft configuration have been studied in high subsonic and transonic speeds. Low order panel method has been used to solve the case of the steady, inviscid and compressible flow on a forward swept wing – canard configuration with cylindrical fuselage and a vertical stabilizer with symmetrical cross section. The aerodynamic coefficients for the forward swept wing aircraft were calculated using measured wake shape from an experimental work on same model configuration. The study showed that the application of low order panel method can be used with acceptable results

View Publication
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Determinations of The Depths to Magnetic Sources Over Al-Ma′Aniyah Depression Area-Southwest Iraq Using The Aeromagnetic Data and Their Tectonic Implication
...Show More Authors

     Tectonically, the location of the Al-Ma'aniyah depression area is far from active boundary zones, their tectonic features have to reflect the original depositional environments with some horizontal movement due to rearrangement of the basement blocks during different actives orogenic movements. So, the analysis of aeromagnetic data were considered to estimate the thickness and structural pattern of the sedimentary cover sequences for this area. The aeromagnetic data, which are derived from Iraqi GEOSURV to Al-Ma′aniyah region is analyzed and processed for qualitative and quantitative interpretations. The process includes reducing the aeromagnetic data to pole RTP, separation the aeromagnetic data to regional an

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 24 2021
Journal Name
Journal Of The College Of Education For Women
Arabic Language Teachers’ Training Needs for Implementing Cognitive Trips Strategy when Teaching Arabic Language Courses in the Kingdom of Saudi Arabia: أمل ناصر الحربي, و وفاء العويضي
...Show More Authors

The present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The market value between the two dilemmas of profit distribution and retention: an analytical study in the Iraqi stock market
...Show More Authors

Abstract:

             The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Hybrid Algorithm for Generate Database Index Key Based on Image Contents
...Show More Authors

  This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys)  of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref