Preferred Language
Articles
/
jeasiq-1893
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

Crossref
View Publication
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
Static Shear Strength of a Non-Prismatic Beam with Transverse Openings
...Show More Authors

In this study, a predicated formula is been proposed to find the shear strength of non-prismatic beams with or without openings. It depends on the contributions of concrete shear strength considering the beam depth variation and existing openings, shear steel reinforcements and defines the critical shear section, the effect of diagonal shear reinforcement, the effect of inclined tensile steel reinforcement, and the compression chord influence. The verification of the proposed formula has been conducted on the experimental test results of 26 non-prismatic beams with or without openings at the same loading conditions. The results reflect that the predicted formula finds the shear capacity of non-prismatic beams with openings, it is co

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Oct 18 2017
Journal Name
Al-kindy College Medical Journal
Non Motor Symptoms In Patients With parkinson's Disease In Baghdad Hospitals
...Show More Authors

Background:Parkinson’disease(PD) is a neurodegenerative disorder of the central nervous system characterized by resting tremor, bradykinesia, cogwheel rigidity, and impairment of postural reflexes; the frequency of PD increases with aging.Clinically Parkinson's disease characterized by two groups of symptoms: motor and non-motor symptoms.Non-motor symptoms can be categorized as autonomic, cognitive/psychiatric (may include depression, dementia, anxiety, hallucinations), sensory and rapid eye movements (REM) sleep behavior disorder (RBD).

Objectives:The objectives of this study are to find out the frequency of the non-motor symptoms of idiopathic Parkinson disease in a group of patients in Baghd

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Co-digestion of Shumblan with Different Wastes as a Source for the Biogas Production
...Show More Authors

Shumblan (SH) is one of the most undesirable aquatic plants widespread in the irrigation channels and water bodies. This work focuses on boosting the biogas potential of shumblan by co-digesting it with other types of wastes without employing any chemical or thermal pretreatments as done in previous studies. A maximum biogas recovery of 378 ml/g VS was reached using shumblan with cow manure as inoculum in a ratio of 1:1. The methane content of the biogas was 55%. Based on volatile solid (VS) and C/N ratios, biogas productions of 518, 434, and 580 ml/g VS were obtained when the shumblan was co-digested with food wastes (SH:F), paper wastes (SH:P), and green wastes (SH:G) respectively. No significant changes of methane contents were observ

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Thu May 14 2020
Journal Name
Journal Of Planner And Development
The Impact of the Method of Dealing with the Product of Wars in the Continuity of the Crisis Wars. Beirut city as an Example
...Show More Authors

This research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.

The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Genetic Algorithm to Estimate the Parameters of the Gumbel Distribution Function by Simulation
...Show More Authors

In this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as  the Bayes method. The comparison was made using the mean error squares (MSE), where the best  estimator  is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Open Life Sciences
Evaluation of the role of some non-enzymatic antioxidants among Iraqi patients with non-alcoholic fatty liver disease
...Show More Authors
Abstract<p>Non-alcoholic fatty liver disease (NAFLD), characterized by hepatic fat accumulation in individuals consuming little or no alcohol, has become highly prevalent globally. Oxidative stress plays a central role in instigating inflammation and cell death pathways driving NAFLD progression. This case–control study aimed to elucidate the association between circulating levels of the pivotal non-enzymatic antioxidants – coenzyme Q10 and vitamins E and C – and liver injury parameters among 60 Iraqi NAFLD patients versus 30 healthy controls. NAFLD diagnosis entailed over 5% hepatic steatosis on ultrasound excluding other etiologies. Patients spanned three age groups: 20–29, 30–39, an</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref