Preferred Language
Articles
/
lxbzi4cBVTCNdQwCm1WL
Interval Value Fuzzy k-Ideals of a KU-Semigroup
...Show More Authors

The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.

Publication Date
Fri Mar 01 2019
Journal Name
Studia Ubb Chemia,
EXCESS AND DEVIATIONS PROPERTIES FOR THE BINARY SOLVENT MIXTURES OF TETRAHYDROFURFURYL ALCOHOL WITH SOME AROMATIC HYDROCARBONS AT 298.15 K.
...Show More Authors

In this work, excess properties (eg excess molar volume (VE), excess viscosity (ȠE), excess Gibbs free energy of activation of viscos flow (ΔG* E) and molar refraction changes (ΔnD) of binary solvent mixtures of tetrahydrofurfuryl alcohol (THFA) with aromatic hydrocarbons (benzene, toluene and p-xylene) have been calculated. This was achieved by determining the physical properties including density ρ, viscosity Ƞ and refraction index nD of liquid mixtures at 298.15 K. Results of the excess parameters and deviation functions for the binary solvent mixtures at 298.15 K have been discussed by molecular interactions that occur in these mixtures. Generally, parameters showed negative values and have been found to fit well to Redlich-Kister

... Show More
View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (16)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
MR Brain Image Segmentation Using Spatial Fuzzy C- Means Clustering Algorithm
...Show More Authors

conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation. 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Technique For Image De-blurring Using Adaptive Wavelet Lagrange Fuzzy Filter
...Show More Authors

A new de-blurring technique was proposed in order to reduced or remove the blur in the images. The proposed filter was designed from the Lagrange interpolation calculation with adjusted by fuzzy rules and supported by wavelet decomposing technique. The proposed Wavelet Lagrange Fuzzy filter gives good results for fully and partially blurring region in images.
 

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
T-ABSO T-Abso and T-Abso Quasi Primary Fuzzy Submodules
...Show More Authors

     Let Ḿ be a unitary R-module and R is a commutative ring with identity. Our aim in this paper  to study the concepts T-ABSO fuzzy ideals, T-ABSO fuzzy submodules and T-ABSO quasi primary fuzzy submodules, also we discuss these concepts in the class of multiplication fuzzy modules and relationships between these concepts. Many new basic properties and characterizations on these concepts are given.

 

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
Takagi–Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Linear Increasing in Radial Electronic Density Distribution for K and L Shells throughout Some Be-Like Ions
...Show More Authors

Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.

View Publication Preview PDF
Crossref