Preferred Language
Articles
/
jeasiq-599
Solve travelling sales man problem by using fuzzy multi-objective linear programming
...Show More Authors

   The main focus of this research is to examine the Travelling Salesman Problem (TSP) and the methods used to solve this problem where this problem is considered as one of the combinatorial optimization problems which met wide publicity and attention from the researches for to it's simple formulation and important applications and engagement to the rest of combinatorial problems , which is based on finding the optimal path through known number of cities where the salesman visits each city only once before returning to the city of departure n this research , the benefits  of( FMOLP)   algorithm is employed as one of the best methods to solve the (TSP) problem and the application of the algorithm in conjunction with one  .

Mathematical model has been established based on unit objective, regarding each objective of the problem, and then establishing a mathematical model, with many objectives to apply the foggy method of many objectives.      

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Effect of Secondary Metabolite Crude of Metarhizum anisopliea Fungus on the Second Larval Stage of the Housefly Musca domestica
...Show More Authors

         The house flies Musca domestica )Diptera:musidae) are the primary carrier of many pathogens such as cholera, typhoid, anthrax, and others. The use of chemical pesticides as a basic method of control leads to many problems at the environmental and health level. The use of safe alternatives to chemical pesticides has become an urgent necessity. The research aims to find biological alternatives that are environment-friendly and non-pathogenic to humans in controlling house flies through the possibility of extracting and diagnosing some secondary metabolites produced by the fungus Metarhizium anisopliae and testing their effects on the second larval stage of house flies using different treatment methods that include

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Evaluation of Some Heavy Metals, Their Fate and Transportation in Water, Sediment, and Some Biota within AL-Musayyib River, Babylon Governorate, Iraq
...Show More Authors

This study estimated seven heavy metals (Fe, Cu, Zn, Pb, Ni, Cd, Cr) in water (dissolved and particulate phase), sediments and some aquatic organisms including two species from aquatic plants (Ceratophyllum demersum&Phragmites australis); one species of clam (Psedontopeses euphratics) and two species from fish (Oreochromis aureus& Leuciscus vorax)in four sites within Mashroo AL- Musayyib channel project/ branch  of Euphrates river, Babylon , medial of Iraq . This aims to show the concentration of these elements, their fate and the mechanisms of their transmission through the food chain in this lotic aquatic system ; also in addition to examining  some physicochemical properties of ri

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of The College Of Basic Education
Efficient Modifications of the Adomian Decomposition Method for Thirteenth Order Ordinary Differential Equations
...Show More Authors

This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.

View Publication
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Geological Journal
Optimization of Horizontal Well Location and Completion to Improve Oil Recovery for an Iraqi Field
...Show More Authors

Exploitation of mature oil fields around the world has forced researchers to develop new ways to optimize reservoir performance from such reservoirs. To achieve that, drilling horizontal wells is an effective method. The effectiveness of this kind of wells is to increase oil withdrawal. The objective of this study is to optimize the location, design, and completion of a new horizontal well as an oil producer to improve oil recovery in a real field located in Iraq. “A” is an oil and gas condensate field located in the Northeast of Iraq. From field production history, it is realized the difficulty to control gas and water production in this kind of complex carbonate reservoir with vertical producer wells. In this study, a horizont

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (25)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Controller work specificity and their impact on performance (Applied Study in the financial oversight bodies)
...Show More Authors

The research aims to a statement of specificity of the Controller of (academic achievement, specialty, job title, length of service, Gender) and its impact on performance, Through a proposed appraisal form includes three main axes and each axis including several specialized elements in the supervisory work in form (check list). as is the importance of research to enable officials of oversight bodies financial identify and diagnose performance Controller through what has this observer of the process of scientific properties when performing supervisory work. Be summarized problem of the research that the lack of regulatory institution with the Controller interesting in terms of the necessary characteristics and requirements and inv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF ELLAGIC ACID ACTIVITY WHEN MIXED WITH SOME TYPES OF CANDY AGAINST Streptococcus mutans ISOLATED FROM ADULT PATIENTS IN BAGHDAD CITY: ESTIMATION OF ELLAGIC ACID ACTIVITY WHEN MIXED WITH SOME TYPES OF CANDY AGAINST Streptococcus mutans ISOLATED FROM ADULT PATIENTS IN BAGHDAD CITY
...Show More Authors

Microbial activity of Ellagic acid when mixed with some types of candy toward Streptococcus mutans microorganism was studied. The main purpose of carrying out this study is to produce a new type of candy that contains Ellagic acid in addition to xylitol instead of sucrose to prevent dental caries. The results show that the inhibitory action of Ellagic acid was more effective when mixed with this type of candy for the purpose of reducing Streptococcus mutans microorganisms, while sensory evaluation was applied in this study to 20 volunteers to that candy sample evaluated which contain (5 mg/ml) Ellagic acid with 100g xylitol to determine consumers acceptability of this sample of candy. The results were expressed as mean value, slandered d

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE EFFECT OF ALCOHOLIC EXTRACT OF Borage officinalis ON MONOAMINE OXIDASE (MAO) AND ACETYLCHOLINESTERASE (AChE) IN HUMAN SERUM IN VITRO.: THE EFFECT OF ALCOHOLIC EXTRACT OF Borage officinalis ON MONOAMINE OXIDASE (MAO) AND ACETYLCHOLINESTERASE (AChE) IN HUMAN SERUM IN VITRO.
...Show More Authors

This study was designed to show the inhibitory effect of different concentrations of alcoholic extract of Borage officinalis on the Monoamine oxidase (MAO) and Acetylcholinesterase (AChE) enzymes in human serum. The results obtained from the study exhibited that alcoholic extract of Borage officinalis caused inhibition to enzymes activity with all concentrations of the extract. The results also showed that when the concentration of the extract was (0.001 mg/ml), the percentage of inhibition was (4.3% with MAO and 15.2% with AChE) and this percentage increases until reaching up to (74.7% with MAO and 84.18% with AChE) when the concentration of the extract was (0.1 mg/ml). From the kinetic parameters, studies found that alcoholic extract o

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF