Preferred Language
Articles
/
bsj-973
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an effective tool for reducing both the dependency problem and the wrapping effect. By construction, Taylor model methods appear particularly suitable for integrating nonlinear ODEs. In this paper, we analyze Taylor model based integration of ODEs and compare Taylor model with traditional enclosure methods for IVPs for ODEs. More advanced Taylor model integration methods are discussed in the algorithm (1). For clarity, we summarize the major steps of the naive Taylor model method as algorithm 1.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Optimal Dimensions of Small Hydraulic Structure Cutoffs Using Coupled Genetic Algorithm and ANN Model
...Show More Authors

A genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Arabian Journal Of Geosciences
Salinity mapping model and brine chemistry of Mishrif reservoir in Basrah oilfields, Southern Iraq
...Show More Authors

View Publication
Crossref (7)
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
meta and its dimensions in the designed bio-formation - virtual reality environment - a model
...Show More Authors

This study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Simulation of myths in industrial product design "the seven eyes amulet as a model"
...Show More Authors

The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Pushing towards ehealth for iraqi hypertensives: an integrated class association rules into SECI model
...Show More Authors

<span lang="EN-GB">This paper highlights the barriers that have led to a delay in the implementation of E-Health services in Iraq. A new framework is proposed to improve the E-Health sector using a SECI model which describes how explicit and tacit knowledge is generated, transferred, and recreated in organizations through main stages (socialization, externalization, combination and internalization). Class association rules (CARs) is integrated to mine the SECI model by extracting related rules which correspond to the medical advice. The proposed framework (SECICAR) can be done through a web portal to assemble healthcare professionals, patients in one environment. SECICAR will be applied to the hypertension community to show th

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Mar 02 2021
Journal Name
Humanitarian And Natural Sciences Journal
THE LINGUISTIC STRUCTURES OF THE HISTORIANS ALYAQOUBI (284 AH / 897 AD) ARE A MODEL
...Show More Authors

The research in the linguistic structures of the historians Al-Yaqoubi is considered a model of the important topics in historical studies in general, given its importance in the lives of peoples due to its connotations and meanings that summarize interpretation, clarification, and prolonged speech, as it includes life meanings with many dimensions, these structures have been used in historical incidents Important, and throughout the different ages, as it can be used to support an opinion, solve problems, prove evidence, increase wisdom, and it needs rich life experiences, and a sound language, to use it, and needs a wide absorptive capacity for the recipient, the research included linguistic structures in the achievement of science , Lingu

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
The genealogy of rough discourse in contemporary theatre (YES, GODOT play) as a model
...Show More Authors

The research is exposed to the concept of rough discourse in contemporary theater with a critical reading that takes the genealogical work as a starting point in deconstructing the references of rough discourse and pursuing its paths in the civilization and cultural framework and how it identifies aesthetically within the theatrical field and the extents of its procedural treatments in order to reveal it and clarify its limits and representations, as the research included the first chapter. (methodological framework), the second chapter (theoretical framework), which included two sections, the first took place under the title (rough dramatization), while the second topic took place under the title (rough drama), and the second chapter re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref