Preferred Language
Articles
/
pRdGPo4BVTCNdQwC8z5B
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Oscillation of Nonlinear First Order Neutral Differential Equations
...Show More Authors

In this paper, the author established some new integral conditions for the oscillation of all solutions of nonlinear first order neutral delay differential equations. Examples are inserted to illustrate the results.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Application of delay integral equations in population growth
...Show More Authors

In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Oscillation of Nonlinear Differential Equations with Advanced Arguments
...Show More Authors

This paper is concerned with the oscillation of all solutions of the n-th order delay differential equation . The necessary and sufficient conditions for oscillatory solutions are obtained and other conditions for nonoscillatory solution to converge to zero are established.

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of The Association Of Arab Universities For Basic And Applied Sciences
Semi-analytical method for solving Fokker-Planck’s equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
One and Two-Dimensional Hydraulic Simulation of a Reach in Al-Gharraf River
...Show More Authors

       

One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Common fixed points and S-best coapproximation in 2-Banach spaces
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi Parametric Logistic Regression Model with the Outputs Representing Trapezoidal Intuitionistic Fuzzy Number
...Show More Authors

In this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.

the model was estimated on simulati

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 20 2026
Journal Name
Al Kut Journal Of Economics And Administrative Sciences
Use of the Bootstrap in the logistic regression model for Breast cancer disease
...Show More Authors

The logistic regression model is one of the oldest and most common of the regression models, and it is known as one of the statistical methods used to describe and estimate the relationship between a dependent random variable and explanatory random variables. Several methods are used to estimate this model, including the bootstrap method, which is one of the estimation methods that depend on the principle of sampling with return, and is represented by a sample reshaping that includes (n) of the elements drawn by randomly returning from (N) from the original data, It is a computational method used to determine the measure of accuracy to estimate the statistics, and for this reason, this method was used to find more accurate estimates. The ma

... Show More
View Publication
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Minimizing error in robot arm based on design optimization for high stiffness to weight ratio
...Show More Authors

In this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.

A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF