Preferred Language
Articles
/
joe-2089
System Identification Algorithm for Systems with Interval Coefficients
...Show More Authors

In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (19)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing

... Show More
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The authority of identification and alienation of existence in the theater of the oppressed: عبلة عباس خضير التميمي
...Show More Authors

This research is represented by exploring the experience of "the theater of the oppressed" by (Augusto Boal) as an experiment that represents a different aesthetic pattern in the presentation of theatrical performance which is in contrast with the Aristotelian and Brechtian patterns, and as a result of the increasing problems of the individual in societies according to his needs and an attempt to express the suffering of human and the loss of his rights in general.
The research also tries to uncover the power of identification and the alienation of existence in the theater of the oppressed as that power, with its diversity of legal, legitimate, religious, political, economic and social capabilities has become a burden instead of being

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Biomedicine And Chemical Sciences
Identification of Pathogenic Fungi in Renal Transplant Patients by Conventional and Molecular Methods
...Show More Authors

Opportunistic fungal infections due to the immune- compromised status of renal transplant patients are related to high rates of morbidity and mortality regardless of their minor incidence. Delayed in identification of invasive fungal infections (IFIs), will lead to delayed treatment and results in high mortality in those populations. The study aimed to assess the frequency of invasive fungal infection in kidney transplant recipients by conventional and molecular methods. This study included 100 kidney transplant recipients (KTR) (75 males, and 25 females), collected from the Centre of Kidney Diseases and Transplantation in the Medical City of Baghdad. Blood samples were collected during the period from June 2018 to April 2019. Twent

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Extraction and Identification of Phenolic Compounds from the Iraqi Heliotropium europaeum L. plant
...Show More Authors

           The plants of genus Heliotropium L. (Boraginaceae) are well-known for containing the toxic metabolites called pyrrolizidine alkaloids (PAs) in addition to the other secondary metabolites. Its spread in the Mediterranean area northwards to central and southern Europe, Asia, South Russia, Caucasia, Afghanistan, Iran, Pakistan, and India, Saudi Arabia, Turkey, and over lower Iraq, Western desert. The present study includes the preparation of various extracts from aerial parts of the Iraqi plant. Fractionation, screening the active constituent, and identification by chromatographic techniques were carried out.Heliotropium  europaeum

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 02 2018
Journal Name
European Journal Of Oral Sciences
Identification of key determinants in<i>Porphyromonas gingivalis</i>host-cell invasion assays
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref