Preferred Language
Articles
/
WxbztIcBVTCNdQwCCl2W
A reliable iterative method for solving the epidemic model and the prey and predator problems
...Show More Authors

In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier as in Variational Iteration Method (VIM) and no needs to construct a homotopy as in Homotopy Perturbation Method (HPM). The results obtained are compared with the results by existing methods and prove that the presented method is very effective, simple and does not require any restrictive assumptions for nonlinear terms. The software used for the numerical calculations in this study was MATHEMATICA r 8.0.

Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Maximum Likelihood Method And Bayesian Method For Estimating Some Non-Homogeneous Poisson Processes Models
...Show More Authors

Abstract

The Non - Homogeneous Poisson  process is considered  as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).

This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto ,   to estimate th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Proposing a General Formula for Evaluating the Parametric Cost Using MLR Method
...Show More Authors

This research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2024
Journal Name
Journal Of Mathematics And Computer Science
The role of human shield in prey‎, ‎crop-raiders and top predator species in southwestern Ethiopia's coffee forests‎: ‎a modeling study
...Show More Authors

In this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe

... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
A Tri-Gene Ontology Migration Operator for Improving the Performance of Meta-heuristics in Complex Detection Problems
...Show More Authors

      Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The Role of Social service in Addressing Social Problems Aversion for Teenagers (A field Study in Baghdad)
...Show More Authors

Adolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives

View Publication Preview PDF
Publication Date
Mon Dec 04 2023
Journal Name
Aip Conf. Proc
Double LA-transform and their properties for solving partial differential equations
...Show More Authors

Scopus (6)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF