Preferred Language
Articles
/
jih-2972
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since it has a minor mean squared error than the other methods followed by the additional shrinkage estimator. The stress and strength belong to the In


verse Kumaraswamy distribution

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
A Pseudo-Random Number Generator Based on New Hybrid LFSR and LCG Algorithm
...Show More Authors

      In many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamics of a delayed ecological model with predator refuge and cannibalism
...Show More Authors

This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Stylistic phenomena in the Quranic referral: (Pronouns of backbiting as a model)
...Show More Authors

                       

Research summary

Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.

Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Philosophy of Precognitive Dream in the American Film (Minority Report - a Model)
...Show More Authors

When we talk about the foresight in films, it is necessary to talk about dreams because foresight represents one of its distinct types. The Precognitive vision has become a possible material in dealing with as subjects in the film industry that adopt these ideas with their philosophical and scientific orientations, because they represent the imagination that predictors are specialized with. It can be invested through the introduction of a vision of another kind to achieve its goals and ambitions in the film industry and in particular the huge institutions of production as in Hollywood. The cinema works in the light of those concepts of production which found the prognostic dream (the foresight) as a distinctive genre in its films,
Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 06 2022
Journal Name
Advances In Systems Science And Applications
Stability and Bifurcation of a Delay Cancer Model in the Polluted Environment
...Show More Authors

It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul

... Show More
View Publication
Scopus (2)
Scopus