Preferred Language
Articles
/
bsj-2154
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a priori and a posteriori error analysis.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (19)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (247)
Crossref (186)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Scientific Journals in the websites of the colleges of University of Baghdad on the web
...Show More Authors

The aim of the research is the knowing of the academic Scientific Journals of the colleges of University of Baghdad , through searching in the University of Baghdad website and the websites of colleges and thus studying the presentation of these journals in those website , and this is done by surfing the main pages of the websites for the colleges included in the research , and by analyzing the research made a menu for all the academic Scientific Journals for all institutes of the University of Baghdad , which simplifies the way for the researchers to publish these researches in the specific journals for their specialties .

View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Impact of the Use of Piano on the Development of Musical Possibilities of Violinists
...Show More Authors

This research is to take advantage of the performance capabilities which the piano has become famous with and transfer the impact of that advantage to the possibilities of playing the violin. The research aims to introduce the effect of using the piano on the development of the violinists' musical potential. The research, in its literature, focuses on the interpretation of the impact on the possibility of both instruments (piano and violin) in two main sections: the piano (its origin, potential and role in music) and the violin (its origin, potential and role in music). The procedures of the research consisted of presenting a special analysis of a questionnaire consisting of a number of questions presented by the researcher to her resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
The Effect of Laser And Thermal Treatment on the Hardness and Adhesion Force on the Cermet Coating By Thermal Spray Technique
...Show More Authors

Ceramic coating compose from a ceramic mixture (MgO, Al2O3) and metall (Al-Ni) were produced by Thermal Spray Technique. The mixed ratio of used materials Al:Ni (50%) and 40% of Al2O3 and 10% MgO. This mixture was spray on a stainless steel substrate of type (316 L) by using thermal spray with flame method and at spraying distances (8, 12, 16 and 20) cm, then the prepared films were treated by laser and thermal treatment. After that performing a hardness and adhesion tests were eximined. The present study shows that the best value of the thermal treatment is 1000 ℃ for 30 mint; the optimum spray distance is 12 cm and most suitable laser is 500 mJ where the microscopic and mechanical character

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Empowerment Human Strategy on Enhancing the Financial Performance: Empirical study on Working Banks in Jordan
...Show More Authors

This study aimed at recognizing the impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan, the axes of the strategy were: informative sharing, free and independence, working teams, and organizational power. To achieve the objective of the study, a questionnaire is designed and distributed on the sample of the study, which represented 60 employees of Banks. After analyzing the data by using SPSS, the study resulted that there is positive impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan. It suggested that the working banks in Jordan should establish database, and to create working teams.

... Show More
View Publication Preview PDF
Crossref