Preferred Language
Articles
/
ijs-4331
Convergence and Stability of Iterative Scheme for a Monotone Total Asymptotically Non-expansive Mapping
...Show More Authors

    In this work, we introduce Fibonacci– Halpern iterative scheme ( FH scheme) in partial ordered Banach space (POB space) for monotone total asymptotically non-expansive mapping (, MTAN mapping) that defined on weakly compact convex subset.  We also  discuss the results of weak and strong convergence for this scheme.

 Throughout  this work, compactness condition of m-th iterate  of the mapping for some natural m is necessary to ensure strong convergence, while Opial's condition has been employed to show weak convergence. Stability of FH scheme is also  studied. A numerical comparison is provided by an example to show that FH scheme is faster than Mann and Halpern iterative schemes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Analysis for Construction in Ibn Khalduon s’ Muqaddimah
...Show More Authors

The specialist researcher  fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic  social  phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with  Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective  and  examine the relationship between The dissert and the city within economic says which are cover  the social analysis ,and determinate   the analysis objects  which clearly in this dualism  model ,between the state and economic bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Proceedings Of The 10th International Joint Conference On Computational Intelligence
Deep Classifier Structures with Autoencoder for Higher-level Feature Extraction
...Show More Authors

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Geological Modeling for Yamama Formation in Abu Amood Oil Field
...Show More Authors

3D geological model of a simple petroleum reservoir for Yamama Formation has
been built in Abu Amood Oil Field using Petrel software, which is a product of
Schlumberger. This model contains the structure, stratigraphy and reservoir
properties (porosity and water saturation) in three directions(X, Y and Z).Geologic
modeling is an applied science of creating computerized representations of portions
of the earth's crust, especially oil and gas fields.
Yamama Formation in Abu Amood Oil Field is divided into thirteen zones by
using well logs and their petrophysical properties, six of which are reservoir zones.
From the top of the formation these six zones are: (YB-1, YB-2, YB-3, YC-1, YC-2
and YC-3). These reservoir

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
Estimating the Reliability Function for Transmuted Pareto Distribution Using Simulation
...Show More Authors

     In this work, the methods (Moments, Modified Moments, L-Moments, Percentile, Rank Set sampling and Maximum Likelihood) were used to estimate the reliability function and the two parameters of the Transmuted Pareto (TP) distribution. We use simulation to generate the required data from three cases this indicates  sample size , and it replicates  for the real value for parameters, for reliability times values  we take .

Results were compared by using mean square error (MSE), the result appears as follows :

The best methods are Modified Moments, Maximum likelihood and L-Moments in first case, second case and third case respectively.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Sequential feature selection for heart disease detection using random forest
...Show More Authors

Heart disease identification is one of the most challenging task that requires highly experienced cardiologists. However, in developing nations such as Ethiopia, there are a few cardiologists and heart disease detection is more challenging. As an alternative solution to cardiologist, this study proposed a more effective model for heart disease detection by employing random forest and sequential feature selection (SFS). SFS is an effective approach to improve the performance of random forest model on heart disease detection. SFS removes unrelated features in heart disease dataset that tends to mislead random forest model on heart disease detection. Thus, removing inappropriate and duplicate features from the training set with sequential f

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (2)
Scopus