Preferred Language
Articles
/
vhe4C5IBVTCNdQwCfZ39
Approximation by Convex Polynomials in Weighted Spaces
...Show More Authors

Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity

Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Guiding Mobile Robot by Applying Fuzzy Approach on Sonar Sensors
...Show More Authors

This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program  uses th

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Estimation of Survival Function for Rayleigh Distribution by Ranking function:-
...Show More Authors

In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using   is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Effect of the electric field on drilling Brass by Laser
...Show More Authors

The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Preparation and Purification of natural uranium metal by Iodine method.
...Show More Authors

In this work ,glass-metal apparatus was designed and manufactured which used for preparing ahigh purity uranium. The reaction is simply take place between iodine vapour and uranium metal at 500C in closed system to form uranium tetra iodide which is decomposed on hot wire at high temperature around 1100C. Also another apparatus was made from Glass and used for preparing ahigh purity of UI4 more than 99.9% purity.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Thyroid Carcinoma Patients Correlated With Cytomegalovirus by using Insitu Hybridization
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Adsorption of BTX Aromatic from Reformate by 13X Molecular Sieve
...Show More Authors

This work deals with separation of the aromatic hydrocarbons benzene, toluene, and xylene (BTX) from reformate. The separation was examined using adsorption by molecular sieve zeolite 13X in a fixed bed process. The concentration of aromatic hydrocarbons in the influent and effluent streams was measured using gas chromatography. The effect of flow rate and bed length of adsorbent on the adsorption of multicomponent hydrocarbons and adsorption capacity of molecular sieve was studied. The tendency of aromatic hydrocarbons adsorption from reformate is in the order: benzene >toluene>xylenes.

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF