Preferred Language
Articles
/
jih-350
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove the above hypothesis. Search time is estimated by the number of comparisons needed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving the Multi-criteria, Total Completion Time, Total Earliness Time, and Maximum Tardiness Problem
...Show More Authors

Machine scheduling problems (MSP) are     considered as one of the most important classes of combinatorial optimization problems. In this paper, the problem of job scheduling on a single machine is studied to minimize the multiobjective and multiobjective objective function. This objective function is: total completion time, total lead time and maximum tardiness time, respectively, which are formulated as  are formulated. In this study, a mathematical model is created to solve the research problem. This problem can be divided into several sub-problems and simple algorithms have been found to find the solutions to these sub-problems and compare them with efficient solutions. For this problem, some rules that provide efficient solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Simulation of Closed Loop Proportional Integral (PI) Controlled Boost Converter and 3-phase Inverter for Photovoltaic (PV) Applications
...Show More Authors

This research deals with the design and simulation of a solar power system consisting of a KC200GT solar panel, a closed loop boost converter and a three phase inverter by using Matlab / Simulink. The mathematical equations of the solar panel design are presented. The electrical characteristics of the panel are tested at the values ​​of 1000  for light radiation and 25 °C for temperature environment. The Proportional Integral (PI) controller is connected   as feedback with the Boost converter to obtain a stable output voltage by reducing the oscillations in the voltage to charge a battery connected to the output of the converter. Two methods (Particle Swarm Optimization (PSO) and Zeigler- Nichols) are used for tuning

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Emerging Trends Technology In Computer Science
A survey of similarity measures in web image search
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Computers And Electronics In Agriculture
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

View Publication
Crossref (108)
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Deconstruction the Theatrical Time in the Expressionist Doctrine
...Show More Authors

Time affects all elements of the intellectual scene or the theatrical scene. It came along with the theatrical doctrines according to the conditions of those doctrines and their conceptual ideas or the method of their mechanisms in the application. While it is classically or realistically integrated, we see it in the expressionist doctrine inconsistent and its inconsistency makes it responsive for the deconstruction strategy. Hence the researcher entitled his study (deconstruction the theatrical time in the expressionist doctrine) so that deconstruction would be a field for his study.   The study starts with an introduction presenting the research problem, importance and objective. The theoretical framework consisted of three s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Analytical Study for the Ability of Some Polymers to Gain Transitional Elements Ionsions in Different Temperature, PH Acidity Functional and Time Situations
...Show More Authors

The compound [K1] was synthesized from the reaction of dichloromethane with linear alkyl benzene (Lab9) using ethanol as a solvent, and from(chloro methyl)-4-nonylbenzene) [K1] it was possible to synthesize the compound Z(4-(nonan-3-yl)phenyl) methane amine) [K2] containing the amine group by synthesized from [K2] reaction with appropriate phenolic aldehydes and using Ethanol as a solvent in the preparation of vinyl chloride4-(((4-nonylbenzyl)imino)methyl)phenol-4-(((4-nonylbenzyl)imino methyl)benzene-1,3diol) [K3-K4] bases has been used. Preparation of a number of Phenolic polymers4-(2- hydroxy-3.5-dimethylbenzyl)-2-methyl-6-(((4-4-(2hyroxy-3, 5-dimethylbenzyl)-2-methyl-6(((4 nonylbenzyl) imino) methyl) benzene-phenolnonylbenzyl) imino) me

... Show More
Preview PDF
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Skills of Time Management and Causes of Wasting The Time of Heads of Department at University of Baghdad From The Staffers’ Point of View
...Show More Authors

            Time is very important in educational institutions. It is also one of our contemporary problem ‚as time is a clear – cut and limited factor‚ it demands that administrators should monitor it by administering and monitoring the principles of time.

Hence‚ the researcher attempts to identify the skills of administrating time and the reasons that cause the waste of time of the Heads of Departments at university of Baghdad.

Significance  of the research:

Time is very important to all educational administrators and one of them is the institutions of Higher education. One of the

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Characterizations of Fe/Mn binary oxide by nitrogen adsorption
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iaes International Journal Of Robotics And Automation
Implementation of a complex fractional order proportional-integral-derivative controller for a first order plus dead time system
...Show More Authors

This paper presents the implementation of a complex fractional order proportional integral derivative (CPID) and a real fractional order PID (RPID) controllers. The analysis and design of both controllers were carried out in a previous work done by the author, where the design specifications were classified into easy (case 1) and hard (case 2) design specifications. The main contribution of this paper is combining CRONE approximation and linear phase CRONE approximation to implement the CPID controller. The designed controllers-RPID and CPID-are implemented to control flowing water with low pressure circuit, which is a first order plus dead time system. Simulation results demonstrate that while the implemented RPID controller fails to stabi

... Show More