Preferred Language
Articles
/
ijs-728
The Minimum Cost for the Vascular Network Using Linear Programming Based Its Path Graph
...Show More Authors

As of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Journal Of Legal Sciences
The responsibility of the Ministry of the Interior for the work of its employees
...Show More Authors

The harm that a member of the internal security forces causes to others is either to ask about him personally according to the rules of responsibility for personal actions whenever the injured man is able to prove the error on his side Or to ask the Ministry of Interior according to the rules vicarious liability, which obligate the follower to compensate the harm caused by his subordinate to others whenever the injured failed to prove the error on the part of the employee of the internal security forces As the error is considered presumed by the Ministry of the Interior without requiring the injured person to prove the latter’s fault, and the reason for that is to protect the injured by facilitating his obtaining compensation, as the o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
College Of Education Journal, Al-mustansiriyah University
Artin Exponent for the Projective Special linear group PSL(2, pk) where pk = 5,7,11,13 and 19
...Show More Authors

Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare some wavelet estimators for parameters in the linear regression model with errors follows ARFIMA model.
...Show More Authors

The aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
New mode for the on-line determination of oxonium ion in different strong acids using CFIA via the use of homemade linear array Ayah 5Sx4-ST- 5D solar CFI analyser
...Show More Authors

New mode for the on-line determination of oxonium ion in different strong acids using CFIA via the use of homemade linear array Ayah 5Sx4-ST- 5D solar CFI analyser

View Publication Preview PDF
Publication Date
Sun Oct 27 2019
Journal Name
Iraqi Journal Of Science
Construct the Character Table of D7h Point Group and Apply it for Classify the (3N-6) Modes of Vibration for the [7] Cyclacene (Linear) Monoring Molecule
...Show More Authors

The character table or the table of eigen values for the D7h point group, which is not found in the literature was constructed. The constructed table is used to classify all modes of the vibrational frequencies of the IR and Raman spectra for any compound or molecule that has the D7h symmetry in the Point Group. For that, it was used for classifying all the modes of vibrational frequencies of the [7] cyclacene (linear) monitoring molecule, possessing D7h symmetry. The constructed table was used to classify the symmetry species for the total degrees of freedom, total degrees of transition, total degrees of rotation and for the total degrees of modes of vibration (3N-6) for this tube. The character table wa

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Development of the Cost and Time Estimation Factors of the Project Dimension in the Agile Software
...Show More Authors

     Agile methodologies are adopted extensively by many of the software industries as it is flexible in nature as well as can address the required changes in any phase of development. Authentic estimation of the software products is not an easy task as it requires continuous attention of the product owner. Effort and cost can be estimated in a proper manner to ensure the success of the project. In this article, we considered the Scrum-based Agile projects that are developed into several Sprints. We proposed an extension to an existing algorithm, based on a total of 36 success factors; that estimate the development cost and effort required to complete the project. For estimation and computations, we have taken a dataset of 12 project

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Artificial Neural Network (ANN) for Prediction of Viscosity Reduction of Heavy Crude Oil using Different Organic Solvents
...Show More Authors

The increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests  and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a  heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage  (5, 10 and  20 wt.% )  of  (n-heptane, toluene, and a mixture of  different ratio

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref