Preferred Language
Articles
/
Nxe8NI8BVTCNdQwC4GHE
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 09 2023
Journal Name
Nonlinear Functional Analysis And Applications
SEVEN-PARAMETER MITTAG-LEFFLER OPERATOR WITH SECOND-ORDER DIFFERENTIAL SUBORDINATION RESULTS
...Show More Authors

This paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.

Preview PDF
Scopus (1)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Three-Dimensional Nonlinear Integral Operator with the Modelling of Majorant Function
...Show More Authors

In this paper, the process for finding an approximate solution of nonlinear three-dimensional (3D) Volterra type integral operator equation (N3D-VIOE) in R3 is introduced. The modelling of the majorant function (MF) with the modified Newton method (MNM) is employed to convert N3D-VIOE to the linear 3D Volterra type integral operator equation (L3D-VIOE). The method of trapezoidal rule (TR) and collocation points are utilized to determine the approximate solution of L3D-VIOE by dealing with the linear form of the algebraic system. The existence of the approximate solution and its uniqueness are proved, and illustrative examples are provided to show the accuracy and efficiency of the model.

Mathematical Subject Classificat

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 08 2021
Journal Name
Journal Of Interdisciplinary Mathematics
The F-composition operator on Hardy space ℍ<sup>2</sup>
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Science And Research (ijsr)
Detection System of Varicose Disease using Probabilistic Neural Network
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Jan 02 2010
Journal Name
Journal Of Al-nahrain University
HIDDEN FEATURES DETECTION USING HISTOGRAM MODIFICATION IN MRI IMAGES
...Show More Authors

Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of an Automatic Control for Two Axis Tracking System for Applications of Concentrated Solar Thermal Power
...Show More Authors

The present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref