Preferred Language
Articles
/
yxekJZIBVTCNdQwCc57V
Solving Tri-criteria: Total Completion Time, Total Earliness, and Maximum Tardiness Using Exact and Heuristic Methods on Single-Machine Scheduling Problems
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad
...Show More Authors

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Partial Differential Equations In Applied Mathematics
Determination of time-dependent coefficient in time fractional heat equation
...Show More Authors

View Publication
Scopus (13)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 26 2009
Journal Name
Iraq Journal For Science
Calculation of time Entry and Exit of satellites from Earth Shadow
...Show More Authors

The tracking of satellites motion and their path around the earth is important things in the mechanical of satellites motion. Significant parameters for the determination of time entrance and existence of the satellite could be obtained from the shadow of the earth. In the present work the tracking and time determination for entry and exit from earth shadow have been studied. In the present work we built a software for tracking the motion of satellites in orbit around the earth and determine the change of both distance and speed as a function of time. The perturbations effect on the satellite has been neglected from the earth atmosphere drag and the earth gravity and other effects. The equation for calculating the shadow is solved using num

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Archives Of Civil Engineeringthis Link Is Disabled
Factors affecting time and cost trade-off in multiple construction projects
...Show More Authors

Scopus (7)
Scopus
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
Study on approximate analytical methods for nonlinear differential equations
...Show More Authors

In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.

Scopus (11)
Scopus
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Proposed methods of image recognition depend on the PCA
...Show More Authors

This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 07 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
IRRIGATION METHODS AND ANTI-TRANSPIRATION AS RELATED TO WHEAT AND WATER PRODUCTIVITY
...Show More Authors

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref