Preferred Language
Articles
/
jih-402
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Oxidative status among a group of pregnant women in relation to gingival health condition
...Show More Authors

Background: pregnancy as a systemic condition causes changes in the functioning of human body as a whole and specifically in the oral cavity and it also is considered as a stressful condition. These changes may favor the increase of oxidative stress. Aim: The aim of this study was to estimate the level of marker of oxidative stress (malondialdehyde) and antioxidant (uric acid) in saliva of pregnant compared to non-pregnant women and to assess the gingival health condition in both groups. Additionally, unstimulated salivary flow rate was determined in both groups. Subjects, materials and methods: The study group consisted of sixty pregnant women, they were divided into three equal groups according to trimester (20 pregnant women for each

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 11 2023
Journal Name
Mathematical Problems In Engineering
Bayesian Methods for Estimation the Parameters of Finite Mixture of Inverse Rayleigh Distribution
...Show More Authors

Methods of estimating statistical distribution have attracted many researchers when it comes to fitting a specific distribution to data. However, when the data belong to more than one component, a popular distribution cannot be fitted to such data. To tackle this issue, mixture models are fitted by choosing the correct number of components that represent the data. This can be obvious in lifetime processes that are involved in a wide range of engineering applications as well as biological systems. In this paper, we introduce an application of estimating a finite mixture of Inverse Rayleigh distribution by the use of the Bayesian framework when considering the model as Markov chain Monte Carlo (MCMC). We employed the Gibbs sampler and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
AWSS: An Algorithm for Measuring Arabic Word Semantic Similarity
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the composite variance of dissected splitting experiments carried out according to the Latin box design
...Show More Authors

In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically)  the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Rotation and Magnetic Force Effects on Peristaltic Transport of Non -Newtonian Fluid in a Symmetric Channel
...Show More Authors

In this paper, the impact of magnetic force, rotation, and nonlinear heat radiation on the peristaltic flow of a hybrid bio -nanofluids through a symmetric channel are investigated. Under the assumption of a low Reynolds number and a long wavelength, the exact solution of the expression for stream function, velocity, heat transfer coefficient, induced magnetic field, magnetic force, and temperature are obtained by using the Adomian decomposition method. The findings show that the magnetic force contours improve when the magnitude of the Hartmann number M is high and decreases when rotation increases. Lastly, the effects of essential parameters that appear in the problem are analyzed through a graph. Plotting all figures is done using the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Fractional Hartley Transform and its Inverse
...Show More Authors

The Hartley transform generalizes to the fractional Hartley transform (FRHT) which gives various uses in different fields of image encryption. Unfortunately, the available literature of fractional Hartley transform is unable to provide its inversion theorem. So accordingly original function cannot retrieve directly, which restrict its applications. The intension of this paper is to propose inversion theorem of fractional Hartley transform to overcome this drawback. Moreover, some properties of fractional Hartley transform are discussed in this paper.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Legal Sciences
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer

... Show More
Preview PDF
Crossref
Publication Date
Thu Mar 16 2017
Journal Name
Journal Of Translation Studies
Problems of Translating Computer Collocations
...Show More Authors