Preferred Language
Articles
/
4Rb-lYcBVTCNdQwCxlb1
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, transitive, tolerance, dominance and equivalence in table.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Heun Method Using to Solve System of NonLinear Functional Differential Equations
...Show More Authors

In this paper Heun method has been used to find numerical solution for first order nonlinear functional differential equation. Moreover, this method has been modified in order to treat system of nonlinear functional differential equations .two numerical examples are given for conciliated the results of this method.

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Sat Feb 28 2015
Journal Name
Al-khwarizmi Engineering Journal
Stabilizing Gap of Pole Electric Arc Furnace Using Smart Hydraulic System
...Show More Authors

Abstract

Electric arc furnace applications in industry are related to position system of its pole, up and down of pole. The pole should be set the certain gap. These setting are needed to calibrate. It is done manually. In this research will proposed smart hydraulic to make this pole works as intelligent using proportional directional control valve. The output of this research will develop and improve the working of the electric arc furnace. This research requires study and design of the system to achieve the purpose and representation using Automation Studio software (AS), in addition to mathematically analyzed and where they were building a laboratory device similar to the design and conduct experiments to stud

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 07 2014
Journal Name
Annals Of Applied Biology
High throughput screening of rooting depth in rice using buried herbicide
...Show More Authors
Abstract<p>Root research requires high throughput phenotyping methods that provide meaningful information on root depth if the full potential of the genomic revolution is to be translated into strategies that maximise the capture of water deep in soils by crops. A very simple, low cost method of assessing root depth of seedlings using a layer of herbicide (<styled-content style="fixed-case">TRIK</styled-content> or diuron) buried 25 or 30 cm deep in soil‐filled boxes of varying size is described that is suitable for screening hundreds or thousands of rice accessions in controlled environment conditions. Variation in cultivar sensitivity to the herbicide when injected into pots was detected but con</p> ... Show More
View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Corrosion Protection of Carbon Steel in Saline Solution Using Plant Extracts
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Feb 02 2015
Journal Name
Al-khwarizmi Engineering Journal
Stabilizing Gap of Pole Electric Arc Furnace Using Smart Hydraulic System
...Show More Authors

Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Scope of using accounting of responsibility under contition of public badget
...Show More Authors

Abstract

  The public budget in Iraq is still prepared according to the traditional base that allocates the  amounts of budget the current year based on the budget of previous year with an increase in estimations with random proportions without connecting the input (financial, human resources and asset )with their output (quantitatively and qualitatively)this caused waste and lose in the available resources therefore the output of budget showed be adapted is such a way that achieving connection between its input and output and to be appropriate with the organizational structure of the state without intrinsic change in its work .this may be realized by adopting the accounting of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 09 2017
Journal Name
International Journal Of Science And Research (ijsr)
Fingerprints Recognition Using the Local Energy Distribution over Haar Wavelet Subbands
...Show More Authors

Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds

... Show More
View Publication
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF