Preferred Language
Articles
/
jih-2957
A Novel Algorithm to Find the Best Solution for Pentagonal Fuzzy Numbers with Linear Programming Problems
...Show More Authors

    Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking function (RF) approaches for solving fuzzy linear programming problems (FLPP) with a pentagonal fuzzy number (PFN) have been proposed, based on new ranking functions (N RF). The simplex method (SM) is very easy to understand. Finally, numerical examples (NE) are used to demonstrate the suggested approach's computing process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
8th Conference On Power Electronics, Machines And Drives (pemd), Glasgow, Uk
Design of tubular moving magnet linear alternator for use with an external combustion - free piston engine
...Show More Authors

Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Dogmatism and Its Relation to Behavioral Problems of Preparatory School Students
...Show More Authors

 The study aims to identify the relationship between Dogmatism and the behavioral problems among preparatory school students. To do this, the researcher adopted Rokeach’s scale of dogmatism, which was modified to be more appropriate of the Iraqi context. A sample of (300) students was chosen randomly to collect the needed data for the current study. To process the data, the researcher employed T-test, Pearson correlation coefficient, and Weighted Mean. The finding revealed that the study sample experience too many behavioral problems, as well as there is a positive strong relationship between Dogmatism and behavioral problems. To conclude, the researcher recommended holding counseling sessions targeting school students to mitigate

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculate Some Special Function For The Design of Cavity Linear Accelerator
...Show More Authors

              The purpose of this project is to build a scientific base and computational programs in an accelerator design work. The transfer of group of laws in alinear accelerator cavity to computer codes written in Fortran power station language is inorder to get a numerical calculation of an electromagnetic field generated in the cavities of the linear accelerator. The program in put contains mainly the following, the geometrical cavity constant, and the triangular finite element method high – order polynomial. The out put contains vertical and horizontal components of the electrical field together with the electrical and the magnetic field intensity. 

View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Teaching Problems Faced by Female Teachers of Students with Intellectual Disability in Special Education Programs and the Proposed Solutions for that from their point of view - a qualitative study
...Show More Authors

This study aims to identify the teaching problems that teachers of students with intellectual disabilities face, in addition to exploring the solutions suggested by them in order to overcome such problems or challenges. The researchers used a qualitative approach in order to understand the teachers' perceptions about these problems in a more in-depth way. The interview tools (in-depth and semi-structured interviews) were used to collect data from (3) female teachers from special education programs in the Asir region. The results revealed a number of themes including problems related to students, teachers and the teaching methods they use, curricula, school environment, and school administration. Moreover, the results indicated that famil

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Use aggregate slide estimate additive splines estimation for the diagnosis of non-linear composite model self-regression with practical application
...Show More Authors

Nonlinear time series analysis is one of the most complex problems ; especially the nonlinear autoregressive with exogenous variable (NARX) .Then ; the problem of model identification and the correct orders determination considered the most important problem in the analysis of time series . In this paper , we proposed splines  estimation method for model identification , then we used three criterions for the correct orders determination. Where ; proposed method used to estimate the additive splines for model identification , And the rank determination depends on the additive property  to avoid the problem of curse dimensionally . The proposed method is one of the nonparametric methods , and the simulation results give a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Approximate Solutions for Nonlinear Blasius Equations
...Show More Authors

The method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 25 2015
Journal Name
International Journal Of Applied Mathematical Research
Exact solutions to linear and nonlinear wave and diffusion equations
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Chemical Methodologies
A Novel Design for Gas Sensor of Zinc Oxide Nanostructure Prepared by Hydrothermal Annealing Technique
...Show More Authors

Scopus (7)
Scopus
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref