Preferred Language
Articles
/
jih-2928
Quasi Semi and Pseudo Semi (p,E)-Convexity in Non-Linear Optimization Programming
...Show More Authors

The class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex functions and pseudo semi -convex functions), and the constraint set is -convex set.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
FLUORESCENCE LIFETIME MEASUREMENT OF C5H6 AND C6D6
...Show More Authors

Absorption and lifetime measurements were made for C6H6. and C6D6 molecules in pure solid phase and in solid matrices of Ar, N2, CO, and CO2. All measurement are made at low temperatures ranging between 12-50 K. A modified least square fitting deconvolution was utilized to measure the fluorescence lifetime with an error less than 1%. The results show that the use of matrix isolation technique offer a unique environment that minimize the perturbation of the molecular or atomic system and hence facilitate spectral analysis.

View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Deasphaltening and Hydrodesulfurization of Basrah Vacuum Residue
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Emotional Intelligence and Leadership Personality for Managers
...Show More Authors

The purpose of this research is to analyze the relationship between the emotional intelligence and the leadership personality of the managers . the research was tested at the college of administration and economics – university of Baghdad through applying it on a sample of (67) members and units of the college. a questionnaire was used as a major tool for collecting data and information . for the purpose of researching to conclusion, the research aimed to test two main hypotheses related to the correlation coefficient and the effect correlation between the two main variable of the research, some statistical techniques such as (the mean, student deviation, percentages, correlation coefficient spearman, simple regression) were us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization
...Show More Authors

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Actor problematic term between ancient and modern
...Show More Authors

Speech is associated with all early term grammar - somewhat - talking about the beginnings of the emergence of grammar, its foundation, and the truth is that this period has remained obscure, what came of them was a novels dealt with a facilitator beginnings as, and this means that what was of grammatical terms in the period of the first generation of grammarians do not constitute in itself, but the initial harbingers of serious way as in the science, and the real beginning of the term grammar mature as orally were at Hebron and Sibawayh evident in the book, then the efforts of the grammarians available until after the term of grammar arrived to what it is .
In this area is (actor) a grammatical terminology, which won at the ancient s

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Asking for permission and its legal ruling
...Show More Authors

Praise be to God, Lord of the Worlds, and the best blessings and peace be upon our master Muhammad and all his family and companions, and those who follow them with goodness until the Day of Judgment. . And after:

God created man in the best manner, and subjugated the universe to him and favored him over the rest of creation when he gave him a mind to contemplate and know how to distinguish between the harmful and the beneficial, the bad and the good, in order to exploit him in achieving the meaning of worship, because it is the highest goal of his creation. God Almighty said (And I did not create the jinn and mankind. Except that they worship them.” [Al-Dhariyat: 56]

If knowing what is harmful from what is beneficial a

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 12 2019
Journal Name
Journal Of The College Of Education For Women
Participatory Planning and Sustainable Development of Society
...Show More Authors

 

Community participation is one of the basic pillars of the sustainable development process. It provides opportunities for different groups of society to contribute to the management, preparation and implementation of development plans commensurate with their needs and aspirations. In this context, the study presents a study of the concept of community participation and its importance in sustainable development, In terms of its conditions, requirements and principles, as well as its image, as well as addressing the most important challenges and obstacles facing the participation of citizens in development projects. The research also provides an analysis of a number of international and Arab experiences adopted In its polici

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Sat Oct 19 2024
Journal Name
European Journal Of Human Genetics
Epigenomic and phenotypic characterization of DEGCAGS syndrome
...Show More Authors

View Publication
Crossref