Preferred Language
Articles
/
jih-2957
A Novel Algorithm to Find the Best Solution for Pentagonal Fuzzy Numbers with Linear Programming Problems
...Show More Authors

    Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking function (RF) approaches for solving fuzzy linear programming problems (FLPP) with a pentagonal fuzzy number (PFN) have been proposed, based on new ranking functions (N RF). The simplex method (SM) is very easy to understand. Finally, numerical examples (NE) are used to demonstrate the suggested approach's computing process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Al-kindy College Medical Journal
Brain Endoscopy, a big neurosurgical revolution
...Show More Authors

Endoscopy is a rapidly growing field of Neurosurgery, it is defined as the applying of endoscope to treat different conditions of brain pathology within cerebral ventricular system and beyond it, endoscopic procedures performed by using different equipment and recording system to make a better visualization enhancing the surgeon's view by increasing illumination and magnification to look around corner and to capture image on video or digital format for later studies.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Statistical analysis from a Gender perspective
...Show More Authors

This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 13 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Study of Collocation in English
...Show More Authors

We used to think of grammar as the bones of the language and vocabulary as the flesh to be added given that language consisted largely of life generated chunks of lexis. This “skeleton image” has been proverbially used to refer to that central feature of lexis named collocation- an idea that for the first 15 years of language study and analysis gave a moment‟s thought to English classroom material and methodology.
The work of John Sinclair, Dave Willis, Ron Carter, Michael McCarthy, Michael Lewis, and many others have all contributed to the way teachers today approach the area of lexis and what it means in the teaching/learning process of the language. This also seems to have incorporated lexical ideas into the teaching mechanis

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
No Mobile Phobia Phenomenon _ A Review
...Show More Authors

The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Ieee Transactions On Microwave Theory And Techniques
A Millimeter-Wave Gyroelectric Waveguide Isolator
...Show More Authors

View Publication
Scopus (13)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
2016 Asia-pacific Microwave Conference (apmc)
A Q-band gyroelectric waveguide isolator
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 29 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Combinatorial Testing Approaches: A Systematic Review
...Show More Authors

Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Aug 01 2021
Journal Name
Materials Today: Proceedings
A review of automatic history matching
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF