In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
Some metal ions (Mn+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of quinaldic acid (QuinH) and α-picoline (α-Pic) have been synthesized and characterized on the basis of their , FTIR, (U.V-Vis) spectroscopy, conductivity measurements, magnetic susceptibility and atomic absorption. From the results obtained the following general formula has suggested for the prepared complexes [M(Quin)2( α-Pic)2].XH2O where M+2 = (Mn, Co, Ni, Cu, Zn, Cd and Hg), X = 2, X = zero for (Co+2 and Hg+2) complexes, (Quin-) = quinaldate ion, (α-Pic) = α-picoline. The results showed that the deprotonated ligand (QuinH) by using (KOH) coordinated to metal ions as bidentate ligand through the oxygen atom of the carboxylate group (-COO-) and the nitrogen ato
... Show MoreComplexes of some metal ions ( Mn(I? ) , Co(??) , Ni(??) ,Cu (??) , Zn(I?) , Cd (??) , and Hg(??) ) with 8-hydroxyquinoline (Oxine) and 2- Picoline (2-pic ) have been synthesized and characterized on the basis of their FT-IR. and Uv-visible spectroscopy ,atomic absorption molar conductivity measurements and magnetic susceptibility ,from the results obtained the following general formula has been given for prepared complexes [M (oxine)2 (2-pic)2]where M = M(??) = Mn , Co , Ni , Cu , Zn , Cd , Hg(oxine)- = ionic ligand 8-hydroxyquinolin (oxinato)(2- pic) = 2- picoline
This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi
An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three repl
... Show MoreThe aim of the research was designing a nutritional program with amino acids well as designing exercises for muscular strength training for youth female badminton players. In addition to that the researcher aimed at identifying the effect of amino acid accompanied with muscular training on some physiological indicators in youth female badminton players. The researcher used the experimental method. The subjects were (7) youth female badminton players from the Armenian badminton club. Many physiological tests were conducted including PWC170 and Vo2Max. The data was collected and treated using proper statistical operations to conclude that amino acid accompanied with muscular ability training have a positive effect on some physiological indica
... Show MoreThe transfer of chemical pollutants from bottled water into water due to heat, sunlight and poor storage is one of the most serious threats to human health around the world, the objective of this study was to estimate the pH value and the transport of heavy metals from plastic bottles to water, for this purpose, 30 bottles of water for 10 local brands were collected and divided into three groups, the first was left at room temperature 25°C, The second was placed in a heat oven at 25°C and the third in another oven at 50°C for two weeks. The results showed significant differences at (P<0.05) between water samples, pH value and concentrations of heavy metals (Sb, Pb, Ni, Cu, Cr, Cd and Fe) we
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More