Preferred Language
Articles
/
jeasiq-717
Fuzzy logic in the estimate of reliability function for k - components systems
...Show More Authors

Abstract:

One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 27 2024
Journal Name
Journal Of Economics And Administrative Sciences
An Integrated Approach to Constraints Theory and Fuzzy Analytical Hierarchy Process (FAHP) in Construction Projects (Case Study)
...Show More Authors

The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim

... Show More
Preview PDF
Crossref
Publication Date
Mon Jul 11 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 22 2025
Journal Name
Iraq Journal Of Market Research And Consumer Protection
Study of the qualitative characteristics of oils derived from fish waste running Asian Silurus triostequs and use of organic solvents in certain food systems
...Show More Authors

View Publication
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the international auditing standard IAS 540 "Auditing accounting estimates and related disclosures" in limiting income smoothing practices in the financial statements (from the point of view of Iraqi auditors)
...Show More Authors

                The current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2011
Journal Name
Journal Of Faculty Of Medicine Baghdad
The correlation between FEV1/ FVC with Arm span to height or chest to waist ratio as an index of pulmonary function in healthy subject.
...Show More Authors

Abstract

Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Of non-Muslim minorities In the Muslim community
...Show More Authors

Of non-Muslim minorities In the Muslim community

View Publication Preview PDF
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Vapor-Liquid-Liquid Equilibrium (VLLE) Data for the Systems Ethyl acetate + Water, Toluene + Water and Toluene + Ethyl acetate + Water at 101.3 kPa. Using Modified Equilibrium Still
...Show More Authors

Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Measuring Gratitude of the Sample of Displaced people in Baghdad city
...Show More Authors

Displacement is a problem that worries the human conscience and has received the attention of the international community. Furthermore, it has become one of the most urgent issues nowadays, especially when the number of displaced people in different countries are increased because of the causes of displacement and their political, economic, environmental, social and psychological effects. Iraq is one of the countries where displacement has taken place in several governorates, according to United Nations and International Organization for Migration (IOM), Iraq is considered the second largest country in the world after Syria in terms of the number of displaced people in 2015. Gratitude, a positive emotional response to benevolence, is a m

... Show More
View Publication Preview PDF