593 results
Search Results
2. معتقدات الطلبة معلّمي الرياضيات نحو تعلّمها وفاعليتهم في تدريسها وعلاقة ذلك بإدراكهم لتطوّر فهم التلاميذ في الرياضيات
- Author
-
عدنان سليم العابد
- Subjects
MATHEMATICS teachers ,SCHOOL children ,MATHEMATICS ,SENSORY perception ,VARIANCES - Abstract
Copyright of Journal of Educational & Psychological Studies / Magallat Al-Dirasat Al-Tarbawiyyat Wa-Al-Bafsiyyat is the property of Sultan Qaboos University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
3. Studying the Coefficient Curvelet for Aerial Image Segmentation
- Author
-
Nagham Sultan and Khalil Alsaif
- Subjects
curvelet transform ,directional filter bank ,pyramidal directional filter banks ,curvelet coefficient ,aerial image ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Currently, there are many approaches for image transformations that are developed to cover the new technology in the huge amount of data treatment. In this paper, a study on Curvelet transformation coefficients was performed based on the aerial image to apply segmentation. This paper applies a lot of modifications on cut off frequencies on the filters, which is used to decompose the image on curvelet transformation. Two approaches are proposed and tested to look for the best segmentation result; the first one is based on designing filters manually, while the second evaluates the filter coefficients depending on the selected shape of the filters. The first technique gives acceptable segmentation and the second reaches the optimal result. One of the most important results is that the cut of frequency has a high effect on the segmentation; in addition, choosing filter parameters depended on the coefficients dimension of the curvelet transformation. Finally, the results show that the first approach underperformed the second one.
- Published
- 2020
- Full Text
- View/download PDF
4. Using Cohen Sutherland Line Clipping Algorithm to Generate 3D Models from 2D
- Author
-
Marah Taha
- Subjects
3d model ,2d drawing ,vision field ,vanishing point ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper provides an efficient algorithm to generate three dimensional objects from simple uncomplicated 2D environment, lead to reduce processor effort, limit of using complex mathematical operations. Most of the previous researches used the idea of drawing by vanishing point to generate 3D objects from 2D environment, But the algorithm designed in this paper provides an idea of how to draw three-dimensional shapes from two-dimensional drawings when applying Cohen Sutherland Line clipping algorithm, so that a basic two-dimensional shape is inserted from a set of points connected with each other must be within vision borders with a vanishing point outside of vision that is connected with all points of basic shape to consist a group of lines with partial intersections. So that any point has specific limited vision border which represents one of its coordinates of depth vertex, finally 3d object is generated when all clipping processes are completed to obtain other coordinates for all points.
- Published
- 2020
- Full Text
- View/download PDF
5. A New Method to Convert the DNA Sequence of Human to a QR Code
- Author
-
Sadoon Abdullah and Zahraa Abdulhamid
- Subjects
dna ,quick response code ,encrypt ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded one of the solutions as a technique among many. This paper includes proposal for using a new technique called (Quick Respond Codes) QR Codes . QR Codes technique is mainly used to convert and store messages since it has higher and large storage capacity, in addition to that we used, in this paper , the STR (Short Tandem Repeats) DNA sequence. STR DNA is very important because each person has its own DNA which means that security and authentication ) reliable ( are very high. The proposed method is to convert the hidden data (STR DNA sequence) to QR code that mean the security is at maximum. Then, by using the MD5 (Message Digest 5) Algorithm, the result data is converted to QR code and the data within the data areas are stored in an unusually large format to make retrieval difficult. Finally, STR DNA sequences were applied in different lengths and converted to QR code. By this method , the QR code is applied in different applications and it was very fast (3-4 second). To apply this technique and to reduce the cost, we use a webcam to get back the private (confidential) data from the QR code. The data were retrieved completely without any error because QR code is reliable and authentic. From the above result we suggest to use QR Code for indentification of the of the individual (ID).
- Published
- 2019
- Full Text
- View/download PDF
6. A Robust Spectral Three-Term Conjugate Gradient Algorithm for Solving Unconstrained Minimization Problems
- Author
-
Abbas Al-Bayati and Sabreen Abbas
- Subjects
three-term conjugate gradient ,scaling parameter ,conjugacy property ,search directions ,large dimensions ,wolfe-powell line search ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we investigated a new improved Conjugate Gradient (CG) algorithm of a Three-Term type (TTCG) based on Dai and Liao procedure to improve the CG algorithm of (Hamoda, Rivaie, and Mamat / HRM). The new CG-algorithm satisfies both the conjugacy condition and the sufficient descent condition. The step-size of this TTCG-algorithm would be computed by accelerating the Wolfe-Powell line search technique. The proposed new TTCG algorithms have demonstrated their global affinity in certain specific circumstances given in this paper.
- Published
- 2019
- Full Text
- View/download PDF
7. Income Tax for Employees using Visual Basic and Access Database
- Author
-
Ruba Ibrahim, Mohamed Mohamed, and Nashwan Ramadan
- Subjects
database ,tax information system ,knowledge management ,employee records ,visual basic ,access database ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In previous years, database applications were built in the form of a file system, but many disadvantages were found after that, such as: data replication , inconsistency while storing, difficulty in accessing data and need to write a new program to execute each new task in addition to isolating the data within multiple file formats ..... etc. All the above problems were solved by using database systems. This paper is an applied to demonstrate the effective role of the tax information system to establish and operate knowledge database as a knowledge management requirement by: the conceptualization of the income tax, knowledge management system and the development of the retirement information system. In this paper, the ACCESS database was created and linked with the Visual Basic language to calculate income tax of the employees. Where the information of employee is entered (such as the employee's name, number and social status as well as the nominal salary). The system has saved and modified information of employees , printing a report on one employee or more, as well as knowing the amount of tax that got from employees .
- Published
- 2019
- Full Text
- View/download PDF
8. Designing a Computer-Based Electronic Archiving System for Nineveh Health Department
- Author
-
Ahmed Fathi Almushhadani and Mafaz Khalil Alanezi
- Subjects
electronic archiving system ,the electronic documents ,computer networks ,sql server ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Information and communication technologies are witnessing tremendous developments in today's world. Which allowed many institutions and departments to adopt ICT in their administrative work. This research discusses the designing of an Electronic Archiving System Based on the Computer Network by using (Visual C #.NET) language and the development of a central database by using (SQL Server 2008). The Ninewa Health bureau has been chosen as a model for completion of the study. To address the problem of the traditional reality experienced by the institutions and departments of the state in Iraq, based on the limited use of information technology, while electronic archiving systems that have become the basic method in the institutions of developed countries. This system works on converting paper documents and attachments into an electronic format, and saving them in the database within indexed records according to the document number or book. The system also provides an integrated tool for the managing mail, and workflow, as well as the preparation of reports, and great flexibility in the management of system database (backup, update of administrative units as per the applicable structure of the bureau concerned), managing user accounts and granting them access permission. The study has showed that the electronic archiving system has a positive impact in the fields of administrative works, through facilitating the process of archiving and saving of documents and official correspondence book to provide office spaces consumed in the storage of paper files. As well as reduce the time and effort spent in the search for files. and the ease of exchanging documents through a local network by the adoption of the (client / server) model to connect the sections of the bureau with each other for integrated with the electronic archiving system. The study aims to strengthen the role of archiving to launch the e-government project by improving and simplifying official transactions procedures. Last but not least the research dealt with a theoretical framework on the archiving (concept, components, types), as well as the practical aspect of the analysis and design of the system and explain how it works. Finally, this research succeed in designing the system, and the system has been tested on real data represented by models of books and official documents in the bureau of Health Nineveh..
- Published
- 2018
- Full Text
- View/download PDF
9. Apply Particle Swarm Optimization Algorithm to Measure the Software Quality
- Author
-
Ibrahim Saleh and Salha Mahammead
- Subjects
software defect ,particle swarm optimization ,neural network back propagation ,nasa ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The process of improvement software quality began from early stages of software engineering development. It uses multiple quality metrics which are very important in software development. To calculate the standards quality of in software testing has been adopted. The software testing is focusing on the Software defect. In this paper is proposed new methods which combine the particle swarm optimization (PSO) to handle the best features Extraction with back-propagation networks to testing and evaluation of the data set . The paper depended database for NASA standards data. The result and experiment method improved quality performance for all classification methods used in the research"Combining Particle Swarm Optimization based Feature Selection and Bagging for Software Defect Prediction ".
- Published
- 2018
- Full Text
- View/download PDF
10. مقارنةمحتوى كتبالرياضياتالفلسطينيةللصفوف من الثالثالىالخامس األساسية مع وثيقةالرياضياتالفلسطينيةفي ضوءمعاييرمحتوى األعدادوالعملياتالتي حددها املجلس الوطني ملعلمي الرياضيات (NCTM).
- Author
-
نورأنيس كرزون
- Abstract
Copyright of Dirasat: Educational Sciences is the property of University of Jordan and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
11. About Fuzzy Differential Equations
- Author
-
Basil Thanoon and Asmaa Al-Katib
- Subjects
fuzzy ,differential equations ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper deals with the fuzzy initial value problem and how to solve a linear fuzzy differential equation of first order when the initial condition is a triangle fuzzy number. This problem is then developed to the case when the initial condition is a trapezoidal fuzzy number. The paper includes also the issue of the representation of a system of linear fuzzy differential equations, a more general system of linear fuzzy differential equations is then proposed and the solution of this system is also given. An illustrative examples are given in order to consolidate the raised ideals.
- Published
- 2014
- Full Text
- View/download PDF
12. Architecture Design of 2-D Discrete Wavelet Transformation Algorithm using Field Programmable Gate Array (FPGA)
- Author
-
Maha Hasso and Sahla Ali
- Subjects
2-d discrete wavelet transformation ,field programmable gate array(fpga) ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper an architecture has been proposed for the 2-D Discrete Wavelet Transform (DWT) and the Inverse Discrete Wavelet Transform (IDWT) based on the Convolution method of the Daubechies 5/3-tap Biorthogonal filter bank in the Algorithm transformto image processing, and implementation it on the FPGA (Field Programmable Gate Array) using VHDL, for benefiting from implementation advantages of these Hardware and save run-time. The processing results proved speed and Efficiency of the proposed architecture, where the employed number of slices is less. So it result to Frequency higher and less run-time.The type of the FPGA based in this paper is Xilinx XC3S500E Spartan-3E using Xilinx ISE 9.2i.
- Published
- 2014
- Full Text
- View/download PDF
13. Application of Some Traditional Denoiseing Algorithms to Zoom-Out the Color Images
- Author
-
Hanan Ali
- Subjects
zoom-out ,linear algorithm ,median algorithm ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper many algorithmswereapplied to" zoom –out" the images, like the traditional algorithm (Linear Averaging) algorithm, then this algorithm was developed to a proposed algorithm (Block Averaging) to be the new one in this paper. another algorithm is obtained from another application which is involved as an enhancement smoothing algorithms and will be used as a (zooming-out) scheme, this algorithm is the (Median) algorithm. The obtained results of these algorithms were compared together to sign the better one. The MATLAB language is used to apply the algorithms. .
- Published
- 2013
- Full Text
- View/download PDF
14. Arabic Handwritten Signature Identification
- Author
-
Alaa Taqa and Hanaa Mahmood
- Subjects
texture analysis ,back propagation artificial neural network ,offline signature identification and verification ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper proposes a new intelligent off-line Arabic handwritten signature identification and verification system based on texture analysis. The system uses the texture as feature and back propagation neural network as classifier. The signature image is preprocessed by several operations (Noise removal, Conversion of the signature image to binary image, Finding outer rectangle, Thinning and Size normalization) then the fractal number and co-occurrence matrix are computed to estimate texture features. In this work, two off-line Arabic handwritten signature identification systems are constructed. The first one uses the nearest Euclidean distance, while the other uses back propagation neural network. The paper analyzes and compares the results obtained from the two proposed systems to show the robustness level of the proposed intelligence system. Furthermore, the proposed system was tested by using Genuine signatures and has achieved a CCR (Correct Classification Rate) of 100% in best cases, while it was tested by using Forged signatures it has achieved a CRR approximated to 96.3% in best cases. The experimental results showed that the proposed system is efficient and competent with other state-of-the-art texture-based off-line signature identification systems.
- Published
- 2013
- Full Text
- View/download PDF
15. The n-Hosoya Polynomials of the Composite of Some Special Graphs
- Author
-
Ahmed Ali
- Subjects
composite graphs g1⊠ g2 ,n-hosoya polynomial ,n-wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
It is not easy to find the n-Hosoya polynomial of the compound graphs constructed in the form G1⊠G2 for any two disjoint connected graphs and .Therefore, in this paper, we obtain n-Hosoya polynomial of G1⊠G2 when is a complete graph and is a special graph such as a complete graph, a bipartite complete, a wheel, or a cycle. The n-Wiener index of each such composite graph is also obtained in this paper.
- Published
- 2013
- Full Text
- View/download PDF
16. Building a System to People Identification Based on Human Hand Geometry
- Author
-
Maha Alrahman Al-Hasoo and Zeena Al-kateeb
- Subjects
authentication system ,hand geometry features ,open set ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper present a new practical authentication system which is depend on one of the biometrics features Hand Geometry features. the proposed system Captures human hand image to extract 50 features then use these features in creating for database system authenticate users stage and recognition stage. The paper present a complete and clear study of the basic fundamentals open set principle and shown the effect of population size on the recognition rate. Good results was obtain that is more than 91% in this application. MATLAB7.9.0 (2009b) programming language has been used to execute the paper algorithms, because its facilities in processing digital images.
- Published
- 2013
- Full Text
- View/download PDF
17. Estimate Programmatic Effort using the Traditional COCOMO Model and Neural Networks
- Author
-
Jamal Al-Din Sayed Majeed and Isra Majeed Qabaa
- Subjects
estimation models ,cocomo model ,artificial neural network ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Estimation models in software engineering are used to predict some important and future features for software project such as effort estimation for developing software projects. Failures of software are mainly due to the faulty project management practices. software project effort estimation is an important step in the process of software management of large projects. Continuous changing in software project makes effort estimation more challenging. The main objective of this paper is find a model to get a more accurate estimation. In this paper we used the Intermediate COCOMO model which is categorized as the best of traditional Techniques in Algorithmic effort estimation methods. also we used an Artificial approaches which is presented in (FFNN,CNN,ENN,RBFN) because of the Ability of ANN(Artificial Neural Network) to model a complex set of relationship between the dependent variable (effort) and the independent variables (cost drivers)which makes it as a potential tool for estimation. This paper presents a performance analysis of ANNs used in effort estimation. We create and simulate this networks by MATLAB11 NNTool depending on NASA aerospace dataset which contains a features of 60 software project and its actual effort. the result of estimation in this paper shows that the neural networks in general enhance the performance of traditional COCOMO and we proved that the ENN was the best network between neural networks and the CNN was the next best network and the COCOMO have the worst between the used methods.
- Published
- 2013
- Full Text
- View/download PDF
18. Representation of the Wavelet Transform 2D using A 5/3 Filter on the Field Programmable Gate Array
- Author
-
Maha Hasso and Sahla Ali
- Subjects
discrete wavelet transform 2d ,convention ,field programmingable gate array ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Recently the Wavelet Transform has gained a lot of popularity in the field of signal and image processing, this is due to its capability of providing both time and frequency information simultaneously.In this paper, focus on used Discrete Wavelet Transform 2-dimenssion )2D- DWT) based on conventional approach, convolution, to image processing and implementation by using FPGA(Field Programmable Gate Array) ,due to many researches were implemented on this Hardware in recent years ,using VHDL. In this paper, has been proposed two VHDL architectures to implementation the conventional of the Daubechies 5/3-tap biorthogonal filter bank, a simple – straightforward one and an optimized one, substituting the multipliers used for scaling with shift – add operations. The architecture of optimized approaches were designed and implemented on FPGA, type of Xilinx XC3S500E Spartan-3E.
- Published
- 2013
- Full Text
- View/download PDF
19. Noor's Curve, a New Geometric Form of Agnesi Witch, a Construction Method is Produced
- Author
-
laith Hadi Munshed Al-ossmi
- Subjects
General Computer Science ,Construction method ,Agnesi, Construction Method, Curves, Ellipse, Noor ,General Mathematics ,Science ,Botany ,General Physics and Astronomy ,General Chemistry ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,Mathematics ,Geometric form - Abstract
In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases; a circle and an ellipse, and all figures and obtained rigour measurements are checked by AutoCAD program. With its simple, symmetric form, the future predictions are tuned for the Noor's curve to be usefully engaged in important practical applications.
- Published
- 2021
20. A Hybrid Algorithm from Cuckoo Search Method with N-Queens Problem
- Author
-
Isra Alkallak
- Subjects
cuckoo search ,n-queen ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper tackled cuckoo search method. The method is one of optimization methods with N-queens problem through proposed hybridization algorithm which mimics the behavior of cuckoo to reach the solution of N-queens problem. The proposed hybridization algorithm is simulated by using MATLAB 6.5 language to mimic the behavior of some cuckoo. These laid their eggs in the nests of other host birds. If a host bird discovers that the eggs aren't their own, it will either throw these alien eggs away, or abandon its nest and build a new one. To reach the solution for N-queens problem easily. The experimental results in this paper show the effectiveness and easy implementation to reach solution.
- Published
- 2012
- Full Text
- View/download PDF
21. A Combined Cubic and Novel Line Search CG-Algorithm
- Author
-
Abbas Al-Bayati and Hamsa Chilmerane
- Subjects
cg-algorithms ,step length ,quadratic function ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper a new line search technique is investigated. It uses (cubic and novel) line searches in the standard CG-algorithm for unconstrained optimization. Applying our new modified version on CG-method shows that, it is too effective when compared with other established algorithms, in this paper, to solve standard unconstrained optimization problems.
- Published
- 2012
- Full Text
- View/download PDF
22. Using Genetic Algorithm to Reduce the Noise Effect on Images
- Author
-
Baydaa Bhnam
- Subjects
genetic algorithm ,image enhancement ,filters ,noise ,digital image ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper deals with a problem that concentrates on the noise removal that the images are affected from different resources employing Genetic Algorithm with filters. To achieve the aims of the paper, six types of genetic filters are suggested for noise removal from the images. These suggested genetic filters depending on filters (mean, median, min and max) as an objective function for them. These suggested genetic filters are applied on several real images contaminated by two types of noise with different levels for comparison and to show the effectiveness of them. The result show that The fifth genetic filter that depends on the median filter as an objective function and heuristic crossover and adding and subtracting mutation, gives the best results with RMSE=15.7243 and PSNR=24.1646 for Lena.bmp image and with RMSE=8.6197 and PSNR=29.4210 for girl.png image when add 0.05 salt & paper noise.
- Published
- 2012
- Full Text
- View/download PDF
23. Design and Implementation of Probabilistic Assignment Management System for a Library Database Using Object Oriented Programming
- Author
-
Jamal Hameed
- Subjects
probabilistic ,library database ,oriented programming ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Computerized information system has recently become widely available. Indeed, it has become an important instrument that can be applied in different aspects of life. One of the important applications of computer systems is that adopted by commercial organization as well as by small business. Hence, we can say that no management can successfully operate in any business without the use of computerized information system. This paper aims to design and implement probabilistic assignmentmanagement system for a librarydatabase commercial library. Most applications of OOP use specialized object oriented languages, but this paper shows that C++ can be used effectively to develop object oriented models of typical library management, and implement OOP is more flexible and reliable and less costing.
- Published
- 2012
- Full Text
- View/download PDF
24. A New Method for Iris Segmentation and Feature Extraction in Spatial Domain
- Author
-
Dujan Taha and Shamil Ibraheem
- Subjects
iris segmentation ,feature extraction ,wavelet transform ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, a new proposed method is developed, this method contains two algorithms, one for human iris recognition, the other is for extracting the features of the recognized iris. Many studies tried to extract the iris from images, most of those studies succeeded but after using very complex processing and filtering operations in addition to transforming the image to other domains (such as frequency domain) to achieve the required operations. The proposed method deduct those complexities operations to a minimum and requires only wavelet transform in a small part of the second algorithm, all other operations will be applied directly to the spatial domain. Experimental results shows the efficiency of the method as its being applied to the images of the Chinese Academy of Sciences – Institute of Automation “CASIA” iris database which contains a lot of deformations. Finally, Matlab R2010a (Ver. 7.10.0) was used to implement the algorithms presented in this paper because it facilitates handling images, arrays, and filters.
- Published
- 2012
- Full Text
- View/download PDF
25. Image Enhancement Based on Fan Filter Parameters Adjustment
- Author
-
Huda Mustafa
- Subjects
curevlet transform ,fan filter ,curvelet coefficients ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In the field of image processing, there is an urgent need to adopt image transformations. In this paper, work is done on image coefficients after decomposing them through Curvelet transformations obtained through the fan filter. The research deals with two stages: the first is to study the effect of the Fan filter by adopting angles (8, 16, 32) on the image (Lina.jpg) of size (256*256) after being analyzed using Curvelet transformations at scales (2,3,4) through comparing a set of measurements (Contrast, Energy, Correlation, MSE, and PSNR) for both the original and reconstructed images. It can be found that Contrast and Energy criteria remain the same for the original and reconstructed images according to different levels of analysis or directions, so the value of the Correlation measure is 1. The value of the MSE criterion is very small and is almost not affected by the change of the number of angles in one scale, but it is slightly affected by increasing the scale analysis. What was mentioned above applies to the PSNR criterion as well. As for the second stage of the research, which included decomposing the image to its coefficients, canceling the effect of one of these coefficients, and then reconstructing it. The results proved that the two criteria (Contrast and Energy) were not affected with falling Correlation criteria from 1 to values ranging from (0.9987_0.9997) depending on the number of scales used in the Curvelet analysis and the number of angles used in Fan filter (8,16,32). The results also showed an increase in the MSE value when dropping some frequencies, and a corresponding decrease in the PSNR value. Whereas, the decrease in the MSE scale was demonstrated at a specific scale with the increase in the number of angles in the Fan filter, in contrast to the PSNR scale.
- Published
- 2021
- Full Text
- View/download PDF
26. Applied Sumudu Transform with Adomian Decomposition Method to the Coupled Drinfeld–Sokolov–Wilson System
- Author
-
Abdulghafor Al-Rozbayani and Ammar Ali
- Subjects
sumudu transform ,adomian decomposition method ,drinfeld–sokolov–wilson ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we studied and applied a modern numerical method, which is combining Sumudu transform with Adomian decomposition Method to obtain approximate solutions of the nonlinear the Coupled Drinfeld– Sokolov–Wilson (DSW) system. Positive and negative values of the variable x and various values of the variable t were taken with the initial conditions of the system as well as the values of the parameters . The efficiency of the method was verified, as the results obtained were compared with the accurate solution of the system. We noticed that the results are very accurate and the effectiveness of the method was confirmed.
- Published
- 2021
- Full Text
- View/download PDF
27. The Modified Integral Transform Method to Solve Heat Equation in a Cylindrical Coordinate
- Author
-
Ahmed Jalal and Ahmed Jassim
- Subjects
heat equation ,integral transform method ,cylindrical coordinate ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper investigated a modified integral transform method used to solve heat equation in cylindrical coordinate, this modification method has been obtained based on integral transform (x-coordinate), we expand integral transform (x-coordinate) to integral transform (x,y,z,t-coordiantes) and convert it to cylindrical coordinate denoted by integral transform (r,θ,z,t-coordinates). Finally we used integral transform to solve heat equation in cylindrical coordinate.
- Published
- 2021
- Full Text
- View/download PDF
28. New Games via Grill-Generalized Open Sets
- Author
-
Rana Esmaeel and Mohammed Mustafa
- Subjects
𝔾-g-open set ,𝔾-g-closed set ,ɠ (ŧ0 ,ɠ(ŧ1 ,ɠ(ŧ ,𝔾) ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper presents some games via 𝔾-g-open sets by using the concept of grill topological space which is Ɠ(Ŧi, 𝔾), where 𝑖={0, 1, 2}. By many figures and proposition, the relationships between these types of games have been studied with explaining some examples.
- Published
- 2021
- Full Text
- View/download PDF
29. Remote Farm Monitoring and Irrigation System
- Author
-
Zena Faysal and Ghassan Mohammed
- Subjects
iot ,smartphone ,sensor ,blynk app ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The research deals with the intelligent irrigation system using the Internet of Things (IoT) via Low cost and low power system on chip microcontrollers including integrated Wi-Fi with dual-mode Bluetooth ESP32. The objectives of this project are to investigate the concept of an intelligent irrigation system using the Internet of Things, to develop a system using the aforementioned controller that processes data from the soil sensor that automatically irrigates the plant and analyzes the soil status of the plants. In real-time via the smartphone connected to the Internet. The study scope focuses on cropping and horticulture. Sensors had to be installed for each plant as it was necessary to know the condition of the soil. A water pump must also be added to each plant to save water. This project requires the Blynk application which is a platform with IOS and Android apps to control Arduino, Raspberry Pi and the likes over the Internet. It’s a digital dashboard where you can build a graphic interface for your project by simply dragging and dropping widgets. Software on smartphone and hardware implementation which can detect environment condition using (DHT22: Temperature and Humidity sensor) sensor and soil moisture sensor. The results of this paper are based on the experiments performed.
- Published
- 2021
- Full Text
- View/download PDF
30. Detection of Plants Leaf Diseases using Swarm Optimization Algorithms
- Author
-
Saud Abdul Razzaq and Baydaa Khaleel
- Subjects
swarm intelligent techniques ,particle swarm optimization (pso) and chicken swarm optimization (cso) ,feature extraction ,plant leaves images ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Classification is widely and largely used in data analysis, and pattern recognition. The data analysis aims to discover similarities between them and group them based on similarity into multiple classes. Artificial intelligence techniques are characterized by their great ability to classify objects and classify images. In this research, some artificial intelligence algorithms, represented by swarm optimization algorithms, were used to detect and classify plant diseases to healthy and unhealthy through images of different leaves of plants. Where plants are considered one of the most important organisms on this planet because of their important and fundamental role in the continuation of life and in achieving environmental balance, as well as in the economic side in many countries, and other benefits of high importance. These plants are apt to many different diseases. As a result of the technological development that the world witnessed in various areas of life, it was necessary to make use of it in the field of plant disease diagnosis, as many artificial intelligence techniques were employed in the discovery and diagnosis of plant diseases. In this paper, a new method is proposed to classify and distinguish a group of eight different plants to healthy and unhealthy based on the leaf images of these plants They are apples, cherries, grapes, peaches, peppers, potatoes, strawberries, and tomatoes using a hybrid optimization algorithm. In the first stage, the plant leaf images were collected and pre-processed to remove noise and improve contrast. In the second stage, the features were extracted based on the statistical feature extraction method, while in the third stage, the particle swarm (PSO) and chicken swarm optimization(CSO) algorithms were used to diagnose and classify plant diseases. Then these two algorithms were combined to produce a proposed hybrid algorithm called (PSO-CSO) hybrid method. The results obtained from these three algorithms were compared and the proposed method (PSO-CSO) obtained the best results compared to the two methods. Where the proposed method obtained in the first and second tests a diagnostic rate of (96.9%) and (98.18%), respectively.
- Published
- 2021
- Full Text
- View/download PDF
31. New Subclass of Meromorphic Functions Associated with Hypergeometric Function
- Author
-
Mohamed Khadr, Ahmed Ali, and Firas Ahmed
- Subjects
hypergeometric meromorphic functions ,starlikeness functions ,convexity functions ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we determine sufficient conditions, distortion properties and radii of starlikeness and convexity for functions The hypergeometric meromorphic functions have certain formula in the punctured unit disk which contains in new subclass.
- Published
- 2021
- Full Text
- View/download PDF
32. Design Educational Bag in Basics of Image Processing
- Author
-
Ghada Tahir Qasim
- Subjects
image processing ,learning bag ,electronic learning ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The didactic bags which are programs designed to replace the teacher in a certain scientific field, are the modernist didactic means which proved great activity in the didactic process and due to the importance of the images processing field of computers, so It has been constructed in this paper on designing of didactic bag in the bases of the images processing field which is considered as one of the classification of computer imaging. The research deals with the images processing in that the idioms. It deals the most famous idioms of images processing. It also treats of some of the images folders shapes. It deals with parts of images processing in detail as well as giving instance to illustrate each of these parts. It deals with the associating process with the parts of the images processing in that digital filtration and mathematical rolling, besides it deals with the special commands in the images processing in some programming languages as Matlab language, c++ language and visual basic language with giving some instances. The paper also contains a show for some internet sites in order to give the opportunity to the user to increase his knowledge and expertise if he wishes to sight the internet sites.
- Published
- 2011
- Full Text
- View/download PDF
33. Intrusion Detection System Based on Neural Networks Using Bipolar Input with Bipolar Sigmoid Activation Function
- Author
-
Adel Issa and Adnan Abdulazeez
- Subjects
firewalls ,intrusion detection systems (ids) ,backpropagation algorithm ,bipolar sigmoid function ,kdd cup 99 dataset ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Vulnerabilities in common security components such as firewalls are inevitable. Intrusion Detection Systems (IDS) are used as another wall to protect computer systems and to identify corresponding vulnerabilities. The purpose of this paper is to use Backpropagation algorithm for IDS by applying bipolar input “input is represented as (1, -1)”, and bipolar sigmoid activation function. The KDD Cup 99 dataset is used in this paper. Number of train dataset is 4947 connection records, and number of test dataset is 3117 connection records. The results of the proposed method show that the PSP is 88.32 and CPT equal to 0.286.
- Published
- 2011
- Full Text
- View/download PDF
34. A Survey of Two Optimization Methods to Solve a Modified Minimal Spanning Tree Problem in Undirected Tree Graph
- Author
-
Isra Alkallak and Ruqaya Sha’ban
- Subjects
simulated annealing ,ant colony ,spanning tree ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper tackled a survey of two optimization methods to study spanning tree problem by modifying the spanning tree problem to generate all of possible solutions in undirected tree graph with simulated annealing algorithm and ant colony optimization algorithm. These algorithms are two of the optimization methods to find optimal solution from many of solutions in search space. A program is written in MATLAB 6.5 language to simulate these two algorithms with spanning tree problem. The experimental results in this paper show the effectiveness and easy implementation of each algorithm to find optimal solution, and to perform significantly better than the manual method.
- Published
- 2011
- Full Text
- View/download PDF
35. Develop Parallel Arithmetic Operations for Binary Modified Signed-Digit System Using Two-Step Algorithm
- Author
-
Wijdan A. Al Karim
- Subjects
parallel arithmetic operations ,signed-digit system ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
An optical computing system is expected to be a powerful information processing system that takes full advantage of optics, such as parallelism, high speed, and large information capacity. Therefore many suitable optical number systems have been developed by many research to exploit the inherent parallelism of optics to developed parallel arithmetic operations . In this paper we used binary modified signed-digit (BMSD) number system and available recoding method to generate a simplified binary MSD addition/subtraction truth table to obtained a parallel two-step algorithm in which the carry chain was generated during the addition operation and the borrowing chain was generated during the subtraction operation that will be stopped after two steps, the addition and subtraction operations will be completed independent of the number of digits in each operand. Also this paper involve limitation for the minterms that used in the logical processing for the addition/subtraction truth table.
- Published
- 2010
- Full Text
- View/download PDF
36. Straight Lines Detection Based on GA with New Modification on Baron's Method
- Author
-
Fawziya Ramo, Nidhal Al-Assady, and Khalil Al-Saif
- Subjects
genetic algorithm ,straight lines detection ,feature extraction ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In view of development on feature extraction in digital image based on feature straight line, GA has been used in this paper after hybrid it with Baron's Method to detect straight line, some developments are performed on the Baron's Method and we called it Genetic Developed Baron's Method (GDBM). The proposed method has been applied in many of sample. The experiments show that the proposed hybrid method in this paper is achieves high performance and it produce 90% detection rate.
- Published
- 2010
- Full Text
- View/download PDF
37. Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network
- Author
-
Amera Badran, Abdulsattar Khidhir, and laheeb Ibrahim
- Subjects
encryption ,lsb algorithm ,rbf network ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an input with the cover to Radial basis function Network to produce the weights. Cover is delivered once to the recipient who can use it for unlimited number of messages. The weights are delivered to the recipient for each hidden message as a key. The recipient uses the cover with the weights to unhide the message. So that this method include two levels of security. The first one is hiding the message in the cover to produce stego-cover image. The second one is ciphering the embedded image using RBF Neural Network. This Network is considered as a target and the input to the Neural Network is the cover image. Then the weights, which represent the encrypted information are reconstructed. The recipient can use RBF Network to unhide the message by having the stego-cover image then the message. Matlab R2008a was used in this paper.
- Published
- 2010
- Full Text
- View/download PDF
38. Arabic Word Recognition Using Wavelet Neural Network
- Author
-
Yousra Al-Irhaim and Enaam Saeed
- Subjects
signal ,classification ,word ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, a system is presented for word recognition using Arabic word signals. The aim of the paper is to improve the recognition rate by finding out good feature parameters based on discrete wavelet transform. We have used Daubechies wavelet for the experiment. The back propagation neural network is used for classification. Test results showing the effectiveness of the proposed system are presented in this paper, A recognition accuracy of 77%.
- Published
- 2010
- Full Text
- View/download PDF
39. Application of Traditional Denoising Algorithms to Zoom-In the Color Images
- Author
-
Hanan Ali
- Subjects
zoom-in ,median algorithm ,max & min algorithm ,convolution algorithm ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper many algorithmswere applied to" zoom –in" the images, like traditional algorithms which is used (Linear Averaging) algorithm, (Convolution) algorithm and the proposed algorithms to be the new algorithms in this paper. These algorithms are obtained from another application which involves in Enhancement Smoothing Algorithms and will be used as a (zooming-in) color images algorithms which are include (Median) Algorithm and (Max & Min) Algorithm and sometimes called (Conservative Smoothing Algorithm). The obtained results of these algorithms were compared together. The MATLAB language is used to apply the algorithms.
- Published
- 2010
- Full Text
- View/download PDF
40. The Numerical Solution and the Convergence Analysis of the Hybrid Method between the Special Insertion and the Iterative Method
- Author
-
Anne Al-Saour and Iman Ahmed
- Subjects
hybrid approach ,special insertion ,rk iterative method for vndes probems ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper devoted to find the solution of the Vanishing Neutral Differential Equations (VNDEs). After having reviewed the ARCHI code, which was originally written by Paul with the aim of solving neutral differential equations, an improvement of this code will be presented in this paper to solve problems of VNDEs. This improvement is done by suggesting a hybrid method of special interpolants with iteration procedure of RK method. We will analyze the convergence of the suggested hybrid method. We conclude that the criteria of convergence for this method is: and when , we have , that is the solution is convergent and the derivative of the solution is also convergent for VNDEs.
- Published
- 2010
- Full Text
- View/download PDF
41. New Hybrid Quasi-Newton Algorithms for Large Scale Optimization
- Author
-
Abbas Al-Bayati and Sawsan Ismail
- Subjects
large scale optimization ,quasi-newton algorithms ,self-scaling update matrix ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each step. The new algorithm has been compared with BFGS standard algorithm by means of (10) multi-dimensional standard functions. As for the second new hybrid algorithm, a new method is used to test the conjugate coefficient (β) which consists of Hestenes Stiefel (HS) and Dai and yuan (DY). Then it is compared with BFGS and PCG algorithms, which uses BFGS update, by means of (10) multi-dimesional standard functions. Numerical results in general indicates the efficiency of the algorithms proposed in this paper by using this number of non-linear functions in this domain.
- Published
- 2009
- Full Text
- View/download PDF
42. Linear Codes Arise From New Complete (n,r)-arcs in PG(2,29)
- Author
-
Shuaa Aziz
- Subjects
linear code ,complete arc ,finite field ,error-correcting codes ,(n ,r)-arcs ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time. The aim of this paper is to formulate the recently discovered upper bounds and lower bound for (n,r)-arcs as bounds that will look familiar to coding theorists.New two lists in this paper appeared, the first list of 15 codes arranged from[164,3,156]-code up to [704,3,678]-code, the second list of 27 codes arranged from [28,3,25]-code up to [776,3,747]-code, they are appeared for the first time in this paper, all of these codes we can call them as complete codes as thier definition in this paper, they belong to the class of error-correcting codes (ECC).In this paper I made a computer programs to construct these new codes with Random Greedy Construction method (RGC) which is mentioned in [13].
- Published
- 2009
- Full Text
- View/download PDF
43. Using the Update of Conditional BFGS in Constrained Optimization
- Author
-
Abbas Al-Bayati and Ban Mitras
- Subjects
constrained optimization ,qn-condition ,bfgs update ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we have used one of the preconditioned conjugate gradient algorithm with the Quasi – Newton approximation; namely the BFGS preconditioned algorithm which was suggested by (AL-Bayati and Aref, 2001). In this paper we have suggested a new algorithm for constrained optimization with robust numerical results, for solving constrained optimization problems.
- Published
- 2009
- Full Text
- View/download PDF
44. Iris Recognition System Based on Wavelet Transform
- Author
-
Maha Hasso, Bayez Al-Sulaifanie, and Kaydar Quboa
- Subjects
recognition ,iris ,wavelet transform ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In order to provide accurate recognition of individuals, the most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded so that comparisons between templates can be made. Most iris recognition systems make use of a band pass decomposition of the iris image to create a biometric template. In this paper, the feature extraction techniques are improved and implemented. These techniques are using wavelet filters. The encoded data by wavelet filters are converted to binary code to represent the biometric template. The Hamming distance is used to classify the iris templates, and the False Accept Rate (FAR), False Reject Rate (FRR) and recognition rate (RR) are calculated [1]. The wavelet transform using DAUB12 filter proves that it is a good feature extraction technique. It gives equal FAR and FRR and a high recognition rate for the two used databases. When applying the DAUB12 filter to CASIA database, the FAR and FRR are equal to 1.053%, while the recognition rate is 97.89%. For Bath database the recognition rate when applying DAUB12 filter is 100%. CASIA and Bath databases are obtained through personal communication. These databases are used in this paper.
- Published
- 2009
- Full Text
- View/download PDF
45. Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time
- Author
-
Kawa Al-Qazilchy
- Subjects
scheduling ,single machine ,set-up times ,dynamic programming ,fixed complexity ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
We solvein this paper some machine scheduling problems with certain conditions; the solution had been made by using dynamic programming procedures with a fixed time for all the algorithms. Some of the algorithms described in the paper represent a modification to some mathematical programming algorithms and some of them are new or a generalization to others. The optimal solution of all these algorithms will be done with a fixed complexity time, which may lead us to solve them easier and faster.
- Published
- 2009
- Full Text
- View/download PDF
46. Design and Implementation of Stream Cipher Using Neural Network
- Author
-
Siddeq Ameen, Mazin Othman, Safwan Hasoon, and Moyed Al-Razaq
- Subjects
neural network ,cryptography ,stream cipher ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable in cryptography because it is impossible, given a reasonable segment of its signals and computer resources, to find out more about them. Pseudorandom bit generators have been widely used to construct these sequences. The paper presents a PN sequence generator that uses neural network. Computer simulation tests have been carried out to check the randomness of the generated through statistical tests. There tests have shown the successful PN sequence generator passes all the recommended tests. The paper also proposes and validates the data encryption and decryption process using neural network instead of using traditional methods (Exclusive or). This task increases the difficulty in the breaking the cipher.
- Published
- 2009
- Full Text
- View/download PDF
47. Weiner Polynomials to Generalize the Distance of Some Composite Graphs from Special Graphs
- Author
-
Ali Ali and Ahmed Ali
- Subjects
n-distance ,wiener polynomials ,composite graphs ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
It is not easy to find the Wiener polynomials for generalized distance of compound graphs constructed in the form and for any two disjoint connected graphs and .Therefore, in this paper, we obtain Wiener polynomials for generalized distance of and when and are special graphs such as complete graphs, and stars. The Wiener index of each such graph with respect to the generalized distance is also obtained in this paper. The Wiener polynomial for the generalized distance of the join of any two disjoint connected graphs is also obtained in this paper.
- Published
- 2008
- Full Text
- View/download PDF
48. A New Numerical Procedure to Compute the Residues of a Complex Functions
- Author
-
Abbas Al-Bayati and Sasan Al-Shwani
- Subjects
complex analytic functions ,residues and poles ,complex improper integrations ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we are going to deal with computations of Residues and Poles for the complex functions . We are also going to investigate a new numerical procedure theoretically and its implementation numerically to compute the residue of complex analytic functions with high order poles. The paper needs the knowledge of computing the complex improper integrations.
- Published
- 2008
- Full Text
- View/download PDF
49. On Centrally Prime and Centrally Semiprime Rings
- Author
-
Adil Jabbar and Abdularahman Majeed
- Subjects
prime rings ,semiprime rings ,centrally prime rings ,centrally semiprime rings ,localization ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, centrally prime and centrally semiprime rings are defined and the relations between these two rings and prime (resp. semiprime) rings are studied.Among the results of the paper some conditions are given under which prime (resp. semiprime) rings become centrally prime (resp.centrally semiprime) as in:1-A nonzero prime (resp. semiprime) ring which has no proper zero divisors is centrally prime (resp.centrally semiprime).Also we gave some other conditions which make prime (resp. semiprime) rings and centrally prime (resp.centrally semiprime) rings equivalent, as in :2-A ring which satisfies the-for multiplicative systems is prime (resp. semiprime) if and only if it is centrally prime (resp.centrally semiprime).3-A ring with identity in which every nonzero element of its center is a unit is prime (resp. semiprime) if and only if it is centrally prime (resp.centrally semiprime).
- Published
- 2008
- Full Text
- View/download PDF
50. w-Wiener Polynomials for Width Distance of Some Special Graphs
- Author
-
Ali Ali and Asma Aziz
- Subjects
wiener polynomial ,width distance ,diameter ,wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Let G be a k0-connected graph ,and let ,,be the w- width, distance between the two vertices u,v in G. The w-Wiener polynomial of the width distance of G is defined by: Ww(G;x) is obtained in this paper for some special graphs G such as a cycle , a wheel, a theta graph , a straight hexagonal chain , and Wagner graph .The diameter with respect to the width distance – w, and the Wiener index for each such special graphs are also obtained in this paper.
- Published
- 2007
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.