Preferred Language
Articles
/
jeasiq-121
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to make sure the accuracy of grey model GM(1,1). The most important results we have reached  (LS) is the best method to estimate the parameters of this model, as when applied proved to obtaining the best results and used this method in the process of addressing one of the problems of this data and missing values, and also used in the forecasting process for   future values.

                                               

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Complaint's Terms and Methods in Statement of Holy Quran
...Show More Authors

This research deals with a unique and innovative topic, that is the study of complaint in the Quranic text. Despite its importance, it has never been studied before, because most of the complaint 's meanings in the Quranic text is: the in explicit complaint. The mentioned complaint's expressions in different contexts overlap with other purposes, in particular call method and its peripherals like mourn , ask for help , exclamation and others.
Moreover, expressions that reveal complaint are related to the complainant's emotional and psychological status, and the complaint's context.
This research deals with the topic into two sections: The first deals with the important expression of complaint such as: iff, ouah, mooing, crying. The

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Some Results on Fixed Points for Monotone Inward Mappings in Geodesic Spaces
...Show More Authors

In this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping,  a monotone inward contraction mapping is a  monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Stages of integration scenarios with strategic management From the perspective of study the historical development of scenarios
...Show More Authors

Purpose: The present study seeks to examine various history stages in which undergone by the concept of scenarios, and development of this concept to integration with the strategic management practices:
Methodology: The current study relied on a literature review and approach in providing total picture of different stages undergone by this concept.
The main results: the scenarios did not reach maturity in their quest for integration with strategic management, and still need a great effort for the maturation of this thought in the framework of strategic management, and through it can contribute in creating important knowledge evolution.
Originality and value: providing a contemporary model linking the roots of this concept and cu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 25 2020
Journal Name
Al-nahrain Journal For Engineering Sciences
Comparison Sequences of Pick and Place System Controlled Using PLC
...Show More Authors

Pick and place system is one of the significant employments of modern robots utilized in industrial environments. The objective of this research is to make a comparison of time sequences by combining multiple axes of sequences. A pick-place system implemented with pneumatic linear double-acting cylinders to applicator in automated systems processes for manufacturing. The challenge of 3-axes movement control was achieved using the PLC (Programmable Logic Controller) controller such that the merging between two or three axes was achieved according to the selected sequence of the program. The outcomes show the contrasted sequences and the reference in a constant velocity. The main variable parameter is the number of steps for each sequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 17 2020
Journal Name
Biochemical And Cellular Archives
COMPARISON OF PERI-IMPLANT MICROBIOTA BETWEEN HEALTHY AND DISEASED IMPLANTS
...Show More Authors

Recently, dental implants have experienced increasing demand as one of the most effective, permanent and stable ways for replacing missing teeth. However, peri-implant diseases that are multispecies plaque-based infections may ultimately lead to implant failure (i.e., late peri-implantitis). Therefore, the present study aims to detect the microbial diversity of subgingival plaque in peri-implantitis cases (N = 30) by comparing with healthy implants (N = 34) using culture-based identification methods, including VITEK 2 system. An increase in microbial diversity (29 species along with 1 and 7 isolates, which were classified as a genus and unidentified species, respectively) were observed in subgingival sites of diseased implants dominated by

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research
Comparison of Bacterial Contamination between I Phone and Galaxy Devices
...Show More Authors

Ninety eight mobile samples, (54) galaxy phone and (44) I phone, were swabbed for bacterial culture determination by culturing on MacConky agar , Blood agar , Mannitol salt agar , Muller Hinton agar .Staphylococcuswas the highest frequent isolated bacteria from Galaxy phone (33%) and I phone (37%). This study revealed that galaxy phone appears less contaminated with bacteria, the ratio of non-contaminated devices is (44%) when compared with I phone (9%). Sensitivity test showed that Ogmintin have the lowest effect on Staphylococcusisolated from both type of devices while cefitriaxone have the highest effect. DNA of isolate from galaxy 31 that exhibit highest resistance against antibiotics was extracted and 16S rRNA gene was polymerized by P

... Show More
Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Literature and Novel: Classical novel in comparison to New Novel By Alain Robbe - Grillet: L'Art et le Roman: Le Roman Traditionnel Face au Nouveau Roman Alain Robe- Grillet
...Show More Authors

Modern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that  has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and  reevaluating the limits of contemporary fiction , into  creating a new form of narrative.

Résumé:

En vue de résu

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 18 2025
Journal Name
Journal Of Physical Education
The impact of proposed approach for flexibility and agility in learning some basic skills on the table land movements in the artistic gymnastics
...Show More Authors

View Publication Preview PDF