Preferred Language
Articles
/
bsj-5309
An Evolutionary Algorithm for Solving Academic Courses Timetable Scheduling Problem
...Show More Authors

Scheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating optimal timetable schedules with different copies by increasing the probability of giving the best schedule for each stage in the campus with the ability to replace the timetable when needed. The Evolutionary Algorithm (EA) utilized in this paper is the Genetic Algorithm (GA) which is a common multi-solution metaheuristic search based on the evolutionary population that can be applied to solve complex combinatorial problems like timetabling problems. In this work, all inputs: courses, teachers, and time acted by one array to achieve local search and combined this acting of the timetable by using the heuristic crossover to ensure that the essential conditions are not broken. The result of this work is a flexible scheduling system, which shows the diversity of all possible timetables that can be created depending on user conditions and needs.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
On A Class of W-Valent Functions With Two Fixed Points Involving Hypergeomatric Function with Generalization Integral Operator
...Show More Authors

In this paper we have studied a generalization of  a class of ( w-valent ) functions with two fixed points involving hypergeometric function with generalization  integral operator . We obtain some results like, coefficient estimates and some theorems of this class.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
A study of the effect of smoking on pulmonary function tests in AL - Kindy teaching hospital, Baghdad
...Show More Authors

ABSTRACTBackground: In Iraq smoking is a common habit in both the urban and rural areas. There are many respiratory diseases like chronic bronchitis, bronchial carcinoma and emphysema which are related to chronic tobacco smoking.Objectives: To study the effect of tobacco smoking on the respiratory system, to establish a correlation between chronic tobacco smoking and its effects on the parameters which were studied and to create awareness in tobacco smokers about the effects of tobacco on their healthMethod: In this study 100 male subjects, 50 chronic smokers and 50 non- smokers were assessed for their pulmonary function tests by using a computerized spirometer.Results: Almost all their respiratory parameters were significantly reduced.

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of the Use of Intensifiers in Charles Dickens’ Hard Times
...Show More Authors

The present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Al-rafidain Journal Of Medical Sciences
Correlation of Kidney Injury Molecule-1 and Nephrin Levels in Iraqi Patients with Diabetic Nephropathy
...Show More Authors

Diabetic nephropathy is characterized by persistent microalbuminuria and metabolic changes that decline renal functions. Researchers have been prompted to explore new biomarkers such as KIM-1 and nephrin that may enhance the identification of disease. Objective: To Evaluate biomarker levels of kidney injury molculre-1 (KIM-1) concentration and nephrin as early and sensitive markers of nephropathy in type 2 diabetic patients. Method: One hundred T2DM patients were included in a cross-sectional study at the specialized center for endocrinology and diabetes, Baghdad. The first group includes 50 diabetic nephropathy (DN) patients, and the second group includes 50 T2DM patients without DN. Biochemical and clinical parameters were reported for pa

... Show More
Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semi Pre Homeomorphism in Fuzzy Topological Spaces
...Show More Authors

   The aim of this paper is to introduce and study new class of fuzzy function called fuzzy semi pre homeomorphism in a fuzzy topological space by utilizing fuzzy semi pre-open sets. Therefore, some of their characterization has been proved; In addition to that we define, study and develop corresponding to new class of fuzzy semi pre homeomorphism in fuzzy topological spaces using this new class of functions.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Optimal Economic Design of Diversion Structures during Construction of a Dam by Particle Swarm Optimization
...Show More Authors

Diverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost

... Show More
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of the Point Efficiency of Sieve Tray Using Artificial Neural Network
...Show More Authors

An application of neural network technique was introduced in modeling the point efficiency of sieve tray, based on a
data bank of around 33l data points collected from the open literature.Two models proposed,using back-propagation
algorithm, the first model network consists: volumetric liquid flow rate (QL), F foctor for gas (FS), liquid density (pL),
gas density (pg), liquid viscosity (pL), gas viscosity (pg), hole diameter (dH), weir height (hw), pressure (P) and surface
tension between liquid phase and gas phase (o). In the second network, there are six parameters as dimensionless
group: Flowfactor (F), Reynolds number for liquid (ReL), Reynolds number for gas through hole (Reg), ratio of weir
height to hole diqmeter

... Show More
View Publication Preview PDF