Preferred Language
Articles
/
jeasiq-34
Solve the fuzzy Assignment problem by using the Labeling method
...Show More Authors

The Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution, Where this method works on the treatment of Fuzzy by transfer the fuzzy assignment model into a fractional assignment model where the numerator represents maximizing performance and minimizing cost. Results show that the efficiency between the first goal is to maximize the performance to the ratio of the second goal is to reduce the cost (0.49) and cost (3,432,000) million dinars..

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Recent modification of Homotopy perturbation method for solving system of third order PDEs
...Show More Authors

This paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.

Scopus (19)
Scopus
Publication Date
Sat Mar 21 2020
Journal Name
Journal Of Engineering
Development of Iraqi license plate recognition system based on Canny edge detection method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo

... Show More
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 28 2021
Journal Name
Journal Of The College Of Education For Women
The Effect of Using the Fear of Failure Motivation Teaching Technique on the Achievement of Students from the Department of the Holy Quran and Its Sciences at Khawlan Faculty of Education in Sana'a University: عبدالغني علي المقبلي
...Show More Authors

Nowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 29 2024
Journal Name
Retos
The effect of special exercises using some auxiliary tools to develop some bio-kinetic abilities and the accuracy of the crushing and snatch forehand strikes among badminton players
...Show More Authors

The best means and ways to develop an athlete's physical and skill capabilities, and among these means is the use of training aids that help develop some bio-kinetic abilities, and prepared exercises have had an important role in improving athletic performance in badminton, where the player must possess physical fitness, explosive power, and strength. Characterized by speed as well as accuracy, awareness, and focus while playing on the court, the badminton player must be physically fit through a continuous movement of small and large muscles to achieve good performance, which requires special physical abilities and skills, and the most important of these bio-kinetic abilities are agility, coordination, and measuring the coordination

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Prevalence and localization of the posterior superior alveolar artery in relation to the floor of the maxillary sinus and alveolar crest among sample of Iraqis using computed tomography
...Show More Authors

Background: Posterior superior alveolar artery (PSAA) is branch of the maxillary artery. It usually supplies the lateral wall of the sinus and overlying membrane. Evaluation and awareness of the anatomy of maxillary sinus before surgery is crucial to avoid surgical complications. The aim of this study is to examine the prevalence, location of the (PSAA) in relation to the floor of the maxillary sinus and alveolar crest using computerized tomography (CT) scans. Materials and Methods: This study included 180 Iraqi subjects (99 males and 81 females) with age more than 16 years old. CT scans for (right and left) Maxillary sinuses were done for each patient. The information obtained was assessed in a coronal multi planar reconstructions images (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref