Preferred Language
Articles
/
1BYJ7YcBVTCNdQwCwnHW
Numerical Solution of Linear System of Fredholm Integral Equations Using Haar Wavelet Method
...Show More Authors

The aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.

View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison some of methods wavelet estimation for non parametric regression function with missing response variable at random
...Show More Authors

Abstract

 The problem of missing data represents a major obstacle before researchers in the process of data analysis in different fields since , this problem is a recurrent one in all fields of study including social , medical , astronomical and clinical experiments .

The presence of such a problem within the data to be studied may influence negatively on the analysis and it may lead to misleading conclusions , together with the fact that these conclusions that result from a great bias caused by that problem in spite of the efficiency of wavelet methods but they are also affected by the missing of data , in addition to the impact of the problem of miss of accuracy estimation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Saudi Medical Journal
Topical zinc sulphate solution for treatment of viral warts.
...Show More Authors

KE Sharquie, AA Khorsheed, AA Al-Nuaimy, Saudi Medical Journal, 2007 - Cited by 91

View Publication
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Transference Number Measurement of Zinc Salts in Aqueous Solution
...Show More Authors

Transference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
On Solution of Min-Max Composition Fuzzy Relational Equation
...Show More Authors

In this paper, Min-Max composition fuzzy relation equation are studied. This study is a generalization of the works of Ohsato and Sekigushi. The conditions for the existence of solutions are studied, then the resolution of equations is discussed.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2023
Journal Name
Studia Chemia
THERMODYNAMIC STUDY OF SOME ALCOHOLS IN DILUTE AQUEOUS SOLUTION
...Show More Authors

Scopus
Publication Date
Thu Oct 01 2009
Journal Name
Baghdad University
Treatment of Cutaneous Leishmaniasis by Topical 25% Podophyllin Solution
...Show More Authors

AG Al-Ghazzi, 2009

View Publication
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Statistical Equations to Estimate the In-situ Concrete Compressive Strength from Non-destructive Tests
...Show More Authors

The aim of this study is to propose reliable equations to estimate the in-situ concrete compressive strength from the non-destructive test. Three equations were proposed: the first equation considers the number of rebound hummer only, the second equation consider the ultrasonic pulse velocity only, and the third equation combines the number of rebound hummer and the ultrasonic pulse velocity. The proposed equations were derived from non-linear regression analysis and they were calibrated with the test results of 372 concrete specimens compiled from the literature. The performance of the proposed equations was tested by comparing their strength estimations with those of related existing equations from literature. Comparis

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Sep 09 2014
Journal Name
Iosr Journal Of Mathematics (iosr-jm)
An Efficient Shrinkage Estimator for the Parameters of Simple Linear Regression Model
...Show More Authors