Preferred Language
Articles
/
jeasiq-2610
Selection of variables Affecting Red Blood Cell by Firefly Algorithm
...Show More Authors

Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 25 2022
Journal Name
Baghdad Science Journal
Evaluating the Activity of Ultrasound on Biofilm Formation by Acinetobacter baumannii isolated from clinical Specimens
...Show More Authors

Acinetobacter baumannii received attention for its multi-drug resistant associated with many severe infections and outbreaks in clinical environment. The aims of the study are to investigate the antibiotic susceptibility profile of clinically isolated A. baumannii, biofilm production, and the efficiency of Low Frequency Ultrasound (LFU) and honey to attenuate biofilm production. A total of 100 samples were taken from different sources from Baghdad hospitals. The susceptibility patterns revealed the percentage of pan drug resistant (PDR) isolates were 1.5 %, 72.7 % were extended drug resistant (XDR), 16.7 % were multidrug resistant (MDR), and 9.1 % were non MDR and sensitive to most antibiotics used. The ability to form

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Dietary Habits for Adolescent Girls Diagnosed with Iron Deficiency Anemia in Kirkuk Secondary Schools
...Show More Authors

Objective(s): To assess the eating habits of adolescent females with iron deficient anemia.

Methodology: This study employed a quantitative research, descriptive evaluation design.The study was carried out on adolescent girls attending Kirkuk secondary school, period from 11 April to 27 December 2022. A non- probability (Purposive) sample has been applied to obtain the study goals. The study sample was (62) student who participate in the study.

Results: Pre-test results from the study revealed that 54.8% of students had moderate IDA. While the students' iron levels returned to normal in the posttest (53.2%). The majority of students (59.7%) had poor eatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum.
...Show More Authors

This research aimed at identifying the factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum. The descriptive method was followed. The questionnaire was used as a tool for data collection,, which was distributed directly to a sample of (181) respondent of the teaching staff members of the senate at University of Khartoum from those who were attend at the senate meeting No. (409) which was held on 22 August 2016 Of (272). The researcher followed for the distribution the chance method, where each questionnaire was distributed to each of a teaching staff from different faculties at the University of Khartoum, according to his willingness

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
مجلة العلوم الاقتصادية والإدارية
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
An Improve Image Encryption Algorithm Based on Multi-level of Chaotic Maps and Lagrange Interpolation
...Show More Authors

Currently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
A Design of a Hybrid Algorithm for Optical Character Recognition of Online Hand-Written Arabic Alphabets
...Show More Authors

     The growing relevance of printed and digitalized hand-written characters has necessitated the need for convalescent automatic recognition of characters in Optical Character Recognition (OCR). Among the handwritten characters, Arabic is one of those with special attention due to its distinctive nature, and the inherent challenges in its recognition systems. This distinctiveness of Arabic characters, with the difference in personal writing styles and proficiency, are complicating the effectiveness of its online handwritten recognition systems. This research, based on limitations and scope of previous related studies, studied the recognition of Arabic isolated characters through the identification o

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Management by roaming and self-efficacy and their impact on the excellence of hotel service: An applied study
...Show More Authors

      This research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through  A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes   12   questions to measure the excellence of the hotel service. The research sample included  43  employees' responding to this

... Show More
View Publication Preview PDF
Crossref