618 results
Search Results
52. New Hybrid Quasi-Newton Algorithms for Large Scale Optimization
- Author
-
Abbas Al-Bayati and Sawsan Ismail
- Subjects
large scale optimization ,quasi-newton algorithms ,self-scaling update matrix ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Two new hybrid algorithms have been suggested in this paper, the first one utilizes four formula of self-scaling update matrix was used. The matrix is selected according to Buckley method in each step. The new algorithm has been compared with BFGS standard algorithm by means of (10) multi-dimensional standard functions. As for the second new hybrid algorithm, a new method is used to test the conjugate coefficient (β) which consists of Hestenes Stiefel (HS) and Dai and yuan (DY). Then it is compared with BFGS and PCG algorithms, which uses BFGS update, by means of (10) multi-dimesional standard functions. Numerical results in general indicates the efficiency of the algorithms proposed in this paper by using this number of non-linear functions in this domain.
- Published
- 2009
- Full Text
- View/download PDF
53. Linear Codes Arise From New Complete (n,r)-arcs in PG(2,29)
- Author
-
Shuaa Aziz
- Subjects
linear code ,complete arc ,finite field ,error-correcting codes ,(n ,r)-arcs ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper presents the recently-discovered linear [n,3,d] codes over PG(2,29) that arises from a complete (n,r)-arcs which the paper[12] presented it for the first time. The aim of this paper is to formulate the recently discovered upper bounds and lower bound for (n,r)-arcs as bounds that will look familiar to coding theorists.New two lists in this paper appeared, the first list of 15 codes arranged from[164,3,156]-code up to [704,3,678]-code, the second list of 27 codes arranged from [28,3,25]-code up to [776,3,747]-code, they are appeared for the first time in this paper, all of these codes we can call them as complete codes as thier definition in this paper, they belong to the class of error-correcting codes (ECC).In this paper I made a computer programs to construct these new codes with Random Greedy Construction method (RGC) which is mentioned in [13].
- Published
- 2009
- Full Text
- View/download PDF
54. Using the Update of Conditional BFGS in Constrained Optimization
- Author
-
Abbas Al-Bayati and Ban Mitras
- Subjects
constrained optimization ,qn-condition ,bfgs update ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we have used one of the preconditioned conjugate gradient algorithm with the Quasi – Newton approximation; namely the BFGS preconditioned algorithm which was suggested by (AL-Bayati and Aref, 2001). In this paper we have suggested a new algorithm for constrained optimization with robust numerical results, for solving constrained optimization problems.
- Published
- 2009
- Full Text
- View/download PDF
55. Iris Recognition System Based on Wavelet Transform
- Author
-
Maha Hasso, Bayez Al-Sulaifanie, and Kaydar Quboa
- Subjects
recognition ,iris ,wavelet transform ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In order to provide accurate recognition of individuals, the most discriminating information present in an iris pattern must be extracted. Only the significant features of the iris must be encoded so that comparisons between templates can be made. Most iris recognition systems make use of a band pass decomposition of the iris image to create a biometric template. In this paper, the feature extraction techniques are improved and implemented. These techniques are using wavelet filters. The encoded data by wavelet filters are converted to binary code to represent the biometric template. The Hamming distance is used to classify the iris templates, and the False Accept Rate (FAR), False Reject Rate (FRR) and recognition rate (RR) are calculated [1]. The wavelet transform using DAUB12 filter proves that it is a good feature extraction technique. It gives equal FAR and FRR and a high recognition rate for the two used databases. When applying the DAUB12 filter to CASIA database, the FAR and FRR are equal to 1.053%, while the recognition rate is 97.89%. For Bath database the recognition rate when applying DAUB12 filter is 100%. CASIA and Bath databases are obtained through personal communication. These databases are used in this paper.
- Published
- 2009
- Full Text
- View/download PDF
56. Dynamic Programming Algorithms for Solving Single Machine Scheduling Problems with a Fixed Complexity Time
- Author
-
Kawa Al-Qazilchy
- Subjects
scheduling ,single machine ,set-up times ,dynamic programming ,fixed complexity ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
We solvein this paper some machine scheduling problems with certain conditions; the solution had been made by using dynamic programming procedures with a fixed time for all the algorithms. Some of the algorithms described in the paper represent a modification to some mathematical programming algorithms and some of them are new or a generalization to others. The optimal solution of all these algorithms will be done with a fixed complexity time, which may lead us to solve them easier and faster.
- Published
- 2009
- Full Text
- View/download PDF
57. Design and Implementation of Stream Cipher Using Neural Network
- Author
-
Siddeq Ameen, Mazin Othman, Safwan Hasoon, and Moyed Al-Razaq
- Subjects
neural network ,cryptography ,stream cipher ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The centaral problem in stream cipher cryptograph is the the difficulty to generate a long unpredicatable sequence of binary signals from short and random key. Unpredicatable sequence are desirable in cryptography because it is impossible, given a reasonable segment of its signals and computer resources, to find out more about them. Pseudorandom bit generators have been widely used to construct these sequences. The paper presents a PN sequence generator that uses neural network. Computer simulation tests have been carried out to check the randomness of the generated through statistical tests. There tests have shown the successful PN sequence generator passes all the recommended tests. The paper also proposes and validates the data encryption and decryption process using neural network instead of using traditional methods (Exclusive or). This task increases the difficulty in the breaking the cipher.
- Published
- 2009
- Full Text
- View/download PDF
58. درجة وعي مشرفات الرياضيات باملرحلتني املتوسطة والجاىوية بأهه املنارسات التدريشية يف ضوء مُكَوِّىَات الرباعة الرياضيَّة.
- Author
-
نوير بنت محمد حجر and د سلمان بن صاهود ž
- Subjects
SUPERVISORS ,MATHEMATICS ,FEMALES - Published
- 2022
59. Weiner Polynomials to Generalize the Distance of Some Composite Graphs from Special Graphs
- Author
-
Ali Ali and Ahmed Ali
- Subjects
n-distance ,wiener polynomials ,composite graphs ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
It is not easy to find the Wiener polynomials for generalized distance of compound graphs constructed in the form and for any two disjoint connected graphs and .Therefore, in this paper, we obtain Wiener polynomials for generalized distance of and when and are special graphs such as complete graphs, and stars. The Wiener index of each such graph with respect to the generalized distance is also obtained in this paper. The Wiener polynomial for the generalized distance of the join of any two disjoint connected graphs is also obtained in this paper.
- Published
- 2008
- Full Text
- View/download PDF
60. A New Numerical Procedure to Compute the Residues of a Complex Functions
- Author
-
Abbas Al-Bayati and Sasan Al-Shwani
- Subjects
complex analytic functions ,residues and poles ,complex improper integrations ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we are going to deal with computations of Residues and Poles for the complex functions . We are also going to investigate a new numerical procedure theoretically and its implementation numerically to compute the residue of complex analytic functions with high order poles. The paper needs the knowledge of computing the complex improper integrations.
- Published
- 2008
- Full Text
- View/download PDF
61. On Centrally Prime and Centrally Semiprime Rings
- Author
-
Adil Jabbar and Abdularahman Majeed
- Subjects
prime rings ,semiprime rings ,centrally prime rings ,centrally semiprime rings ,localization ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, centrally prime and centrally semiprime rings are defined and the relations between these two rings and prime (resp. semiprime) rings are studied.Among the results of the paper some conditions are given under which prime (resp. semiprime) rings become centrally prime (resp.centrally semiprime) as in:1-A nonzero prime (resp. semiprime) ring which has no proper zero divisors is centrally prime (resp.centrally semiprime).Also we gave some other conditions which make prime (resp. semiprime) rings and centrally prime (resp.centrally semiprime) rings equivalent, as in :2-A ring which satisfies the-for multiplicative systems is prime (resp. semiprime) if and only if it is centrally prime (resp.centrally semiprime).3-A ring with identity in which every nonzero element of its center is a unit is prime (resp. semiprime) if and only if it is centrally prime (resp.centrally semiprime).
- Published
- 2008
- Full Text
- View/download PDF
62. w-Wiener Polynomials for Width Distance of Some Special Graphs
- Author
-
Ali Ali and Asma Aziz
- Subjects
wiener polynomial ,width distance ,diameter ,wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Let G be a k0-connected graph ,and let ,,be the w- width, distance between the two vertices u,v in G. The w-Wiener polynomial of the width distance of G is defined by: Ww(G;x) is obtained in this paper for some special graphs G such as a cycle , a wheel, a theta graph , a straight hexagonal chain , and Wagner graph .The diameter with respect to the width distance – w, and the Wiener index for each such special graphs are also obtained in this paper.
- Published
- 2007
- Full Text
- View/download PDF
63. Image Compression Technique Using a Hierarchical Neural Network
- Author
-
Rafid Khalil and Mohammed Younis
- Subjects
image compression ,resilient backpropagation (rbp) algorithm ,hierarchical neural network ,noise ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This paper present a Resilient Backpropagation (RBP) algorithm based on hierarchical neural network for image compression. The proposed technique includes steps to break down large images into smaller blocks for image compression/ decompression process. Furthermore, a Linear Backpropagation (LBP) algorithm is also used to train hierarchical neural network, and both training algorithms are compared. A number of experiments have been achieved, the results obtained, are the compression rate and Peak Signal to Noise Ratio of the compressed/ decompressed images which are presented in this paper.
- Published
- 2006
- Full Text
- View/download PDF
64. The n-Hosoya Polynomials of the Square of a Path and of a Cycle
- Author
-
Ahmed Ali
- Subjects
n-diameter ,n-hosoya polynomial ,n-wiener index ,path square and cycle square ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The n-Hosoya polynomial of a connected graph G of order t is defined by: Hn (G;x) = ∑ Cn (G;x) xk, where, Cn(G,k) is the number of pairs (v,S), in which |S| = n -1, 3 ≤ n ≤ t, v ∈ V(G) , S ⊆ V (G) , such that dn(v,S) = k , for each 0 ≤ k ≤ δn. In this paper, we find the n-Hosoya polynomial of the square of a path and of the square of a cycle. Also, the n-diameter and n-Wiener index of each of the two graphsare determined
- Published
- 2021
- Full Text
- View/download PDF
65. Solve Partial Differential Equations using the Banach Contraction Method and Improve Results Using the Trapezoidal Rule
- Author
-
Ahmed Ghitheeth and Hiba Mahmood
- Subjects
banach contraction method ,trapezoidal rule ,partial differential equations ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, the Banach contraction method (BCM) was hybridized with the base of the trapezoid (TR) to solve non-linear partial differential equations. The results obtained from (BCM) were improved by (TR). The results obtained from (BCM -TR) proved the efficiency of this method compared to the default method (BCM). This was done by calculating the mean0square0error (MSE) and estimating the absolute0maximum0error (MAE).
- Published
- 2021
- Full Text
- View/download PDF
66. Numerical Solution of Electromagnetic Problem MHD in a Polar Coordinates
- Author
-
Ahmed Jassim and Ahmed Amen
- Subjects
numerical solution ,polar coordinates ,mhd problem ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we studied a flow of fluid in a pipe under the effect of electromagnetic field in a polar coordinate, be done build a mathematical model which represented by system of two dimensional non-linear partial differential equations and we solved it by using Alternating Directions Implicit method (ADI) which is one of the finite differences method, and from the numerical solution indicated the behavior of temperature distribution inside the pipe, be done explication the influence of Rayleigh number and Prandtl number as well as the influence of Eckert number upon the behavior of temperature distribution are also done through the energy equation in polar coordinate, we arrived to steady state from unsteady state, we find the behavior of fluid flow inside the pipe and also we studied the influence of Hartmann number upon the behavior of fluid flow in pipe and all this done through the motion equation in polar coordinate.
- Published
- 2021
- Full Text
- View/download PDF
67. Schultz and Modified Schultz Polynomials for Vertex – Identification Chain and Ring – for Hexagon Graphs
- Author
-
Mahmood Abdullah and Ahmed Ali
- Subjects
schultz ,modified schultz ,vertex identification chain and ring ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The aim of this paper is to find polynomials related to Schultz, and modified Schultz indices of vertex identification chain and ring for hexagonal rings (6 – cycles). Also to find index and average index of all of them.
- Published
- 2021
- Full Text
- View/download PDF
68. Estimation of Non-Normal Process Capability Indices
- Author
-
Huda Mohamed Taib and Ban Alani
- Subjects
process capability indices ,clements’ method ,weighted variance method ,box-cox transformation ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The important and common applications of process capability indices (PCI’s) is the process capability ratio and the process capability index , and the use of these measures in practical applications is based on the assumption that the process is under statistical control and that the outputs of that process follow the normal distribution. In practice, however, there are many cases in which the outputs of the process are not follow normal distribution, in such cases, calculating PCI’s will lead to misleading results. In this paper, the non-normal production process capability was evaluated. The evaluation process was conducted using four methods: The first method involved the use of Box-Cox power transformation to normal distribution of data and then calculating indicators of the capability process by traditional methods. The second method is by using the weighted variance method, and the third method is by using the Clements’ method based on the percentiles calculation of data, and the fourth method is based on the use of the Darling-Anderson goodness of fit test to accommodate some of the probability distributions of the original data, this test shows that the log-normal distribution is the most appropriate distribution for the data The results showed that although the process is stable and under statistical control, it is not capable based on the value of the process capability index that did not exceed (65%), as the percentage defect units, which is outside the specifications, is large and located between (3.6%) and (13.4%). The results also showed that there is a convergence in the results of the PCI’s calculated by all methods, and that the Clements’ method is the best method as it gives the highest values for the PCI’s. The research recommended studying and calculating other PCI’s like, , , and CMA(τ,v). One of the recommendations for future research and studies is to do a theoretical study to compare the mentioned methods and choose the best ones based on some statistical criteria.
- Published
- 2021
- Full Text
- View/download PDF
69. Electronic System for Managing Theses of Computer Science College
- Author
-
Dhafar Al-Ali and Auday Al Wattar
- Subjects
electronic management ,theses and dissertations ,replication ,dbms ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This research paper includes designing and implementing of an Electronic system for managing theses of College of Computer Science and Mathematics, University of Mosul, using replication, C # language and MS SQL Server 2008 databases to be a stable work basis that can be relied upon in the departments’ work as it facilitates the higher administrative bodies in the departments and the deanship Obtaining the required results quickly and accurately, which facilitates and contributes to making the right decisions at the appropriate time and required with the ease of preparing special reports for each student, lecturer and thesis and printing them which it will help the departments head and the scientific committee to complete them if requested, as well as provide various statistics, and to improve administrative efficiency for thesis, the problem of losing thesis data and preserving it from human and natural disasters has been overcome by applying the principle of replication.
- Published
- 2021
- Full Text
- View/download PDF
70. A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
- Author
-
Shurooq Ahmed Kareem
- Subjects
General Computer Science ,General Mathematics ,Maximum likelihood ,General Physics and Astronomy ,General Chemistry ,01 natural sciences ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,010104 statistics & probability ,03 medical and health sciences ,0302 clinical medicine ,030220 oncology & carcinogenesis ,Botany ,Burr-XII failure model, Maximum likelihood estimator, Moments estimator, Percentile estimator ,lcsh:Q ,0101 mathematics ,lcsh:Science ,Mathematics - Abstract
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parameters (α, r) and one scale parameter (λ) which is considered known. So, this paper defines the p.d.f. and CDF and derives its Moments formula about origin, and also derive the Moments estimators of two shapes parameters (α, r) in addition to maximum likelihood estimators as well as percentile estimators, the scale parameter (λ) is not estimated (as it is considered known). The comparison between three methods is done through simulation procedure taking different sample size (n=30, 60, 90) and different sets of initial values for (α, r, λ).It is observed that the moment estimators are the best estimator with percentage (46%) ,(42%) respectively compared with other estimators.
- Published
- 2020
71. مدى تضمين جوانب STEM في کتب الرياضيات للصفوف الأولية في المملکة العربية السعودية.
- Author
-
أ. فاتن بنت مطلق ا and د. نورة بنت صالح ا
- Subjects
CONTENT analysis ,MATHEMATICS - Published
- 2022
72. تدريس الرياضيات باستراتيجية ثنائية التحليل والتركيب وأث ره في تنمية مهارات ا لستقصاء العلمي لدى طلاب المرحلة الثانوية في دولة الكويت
- Author
-
مشاري مطر الشمري and عبد الله سالا البع
- Abstract
Copyright of Arab Journal of Science & Research Publishing is the property of Mussasat Al-Majallah Al-Arabiyah lil-Ulum Wa-Nashr Al-Abhath and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
73. DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
- Author
-
Mohammed I. Younis
- Subjects
General Computer Science ,General Mathematics ,Combinatorial testing ,Botany ,General Physics and Astronomy ,lcsh:Q ,General Chemistry ,Combinatorial testing, Event testing, Multi-way testing, Sequence testing, T-way testing ,lcsh:Science ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,Mathematics - Abstract
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of coverage. Motivated by such challenge, this paper proposes a novel SCA strategy called Dynamic Event Order (DEO), in which the test case generation is done using one-parameter-at-a-time fashion. The details of the DEO are presented with a step-by-step example to demonstrate the behavior and show the correctness of the proposed strategy. In addition, this paper makes a comparison with existing computational strategies. The practical results demonstrate that the proposed DEO strategy outperforms the existing strategies in term of minimal test size in most cases. Moreover, the significance of the DEO increases as the number of sequences increases and/ or the strength of coverage increases. Furthermore, the proposed DEO strategy succeeds to generate SCAs up to t=7. Finally, the DEO strategy succeeds to find new upper bounds for SCA. In fact, the proposed strategy can act as a research vehicle for variants future implementation.
- Published
- 2020
74. Solutions and Recent Challenges Related to Energy in Wireless Body Area Networks with Integrated Technologies: Applications and Perspectives
- Author
-
Kashif Naseer Qureshi and Yousra Abdul Alsahib S. Aldeen
- Subjects
General Computer Science ,General Mathematics ,010401 analytical chemistry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Body area ,General Physics and Astronomy ,020206 networking & telecommunications ,02 engineering and technology ,General Chemistry ,01 natural sciences ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,0104 chemical sciences ,Botany ,Cluster Heads, Energy Efficiency, Routing Protocols, WBAN, WSN ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:Q ,lcsh:Science ,Mathematics - Abstract
In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communication in a wireless environment. Because of the very tiny size, energy consumption matters a lot. We have focused on the protocols, which provide energy efficiency and improve network lifetime, through put and minimal path loss. We will be discussing some of the most recent energy efficient routing protocols in this paper; later their comparison with an appropriate table is presented. In addition, recent challenges, possible application and perspectives are discussed.
- Published
- 2020
75. ii- Open Set in Bitopological Spaces
- Author
-
Beyda Abdullah and Amir Mohammed
- Subjects
α- open set ,i- open set ,ii- open set ,bitopological space ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we define ii-open set in bitopological space as follows: Let ( , , ) be a bitopological space, a subset A of is said to be ( – ii- open set ) if there exist U,V ≠ and U,V such that: A=int1(U) or A=int2 (V) A or A We study some characterizations and properties of this class. Also, we explain the relation between ii- open sets and open sets, i-open sets and α-open sets in bitopological space. Furthermore, we define ii- continuous mapping on bitopological spaces with some properties.
- Published
- 2020
- Full Text
- View/download PDF
76. Zero Divisor Graph Of ZpM qr with Applications
- Author
-
Nazar Shuker, Husam Mohammad, and Luma Khaleel
- Subjects
zero-divisor graph ,chromatic number ,hosoya polynomial ,wiener index ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we study zero-divisor graph of the ring Zpmqr and give some properties of this graph. Also, we find the chromatic number, Hosoya polynomial and Wiener index of this graph.
- Published
- 2020
- Full Text
- View/download PDF
77. Some Properties of Algebra of Quotients with Bounded Evaluation of a Norm Ideal on Complex Banach Space
- Author
-
Mohammed Al-Neima and Amir Mohammed
- Subjects
algebra of quotients with bounded evaluation ,bounded algebra of quotients ,totally prime algebra ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Cabrera-Mohammed proved that the imbedding of a norm ideal on Hilbert space in algebra of quotients with bounded evaluation is continuous with other properties. In this paper we improve this result by using complex Banach space instated of Hilbert space.
- Published
- 2020
- Full Text
- View/download PDF
78. Statistical Analysis of the Quality of Date Production for 2019 in Iraq
- Author
-
Nadia Ayed
- Subjects
stepwise multiple regressions ,estimate parameters of the model ,the coefficient of determination ,descriptive statistics ,anova ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Dates are a great food that meets many human needs, and the government should encourage and intensify efforts to support the expansion of palm cultivation and development and focus on its production in our country as a means of food security in the future. In addition, palm trees have an important economic role in improving the country's economy. In this paper, a sharp decline in the quality of production will be highlighted. So, the aim of the study is to know the most important types of palm trees that affect the production of tigers for the year 2019 if the study includes 11 governorates, and the multiple linear regression method has been applied in selecting the most important types affecting the production.. and the types of palm trees did not appear Halawi and Khattawi and Khadari any effect on Dates production in the aforementioned year, although these types are considered to be one of the desirable first-class varieties in the Iraqi market, and for export in particular, in a manner that supports the country's economy.
- Published
- 2020
- Full Text
- View/download PDF
79. Hosoya Polynomial, Wiener Index, Coloring and Planar of Annihilator Graph of Zn
- Author
-
Mohammed Ahmed, Akram Mohammed, and Nabeel Arif
- Subjects
annihilator graph of ring ,zero-divisor graph ,hosoya polynomial ,wiener index ,coloring graph and planar graph ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Let R be a commutative ring with identity. We consider ΓB(R) an annihilator graph of the commutative ring R. In this paper, we find Hosoya polynomial, Wiener index, Coloring, and Planar annihilator graph of Zn denote ΓB(Zn) , with n= pm or n=pmq, where p, q are distinct prime numbers and m is an integer with m ≥ 1 .
- Published
- 2020
- Full Text
- View/download PDF
80. A Comparative Study of Methods for Separating Audio Signals
- Author
-
Riham Issa and Yusra Mohammad
- Subjects
blind source separation ,independent component analysis ,deep neural networks ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The process of separating signal from a mixture of signals represents an essential task for many applications including sound signal processing and speech processing systems as well as medical signal processing. In this paper, a review of sound source separation problem has been presented, as well as the methods used to extract features from the audio signal, also, we define the Blind source separation problem and comparing between some of the methods used to solve the problem of source separation.
- Published
- 2020
- Full Text
- View/download PDF
81. Smart Agriculture; Farm Irrigation System Using IoT
- Author
-
Amera Badran and Manar Kashmoola
- Subjects
internet of things ,mqtt protocol ,smart irrigation ,soil moisture ,soil constants ,field capacity ,wilting point ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Due to the increase of development in modern technology which entered in most fields of life including sustainable agriculture; most studies revealed that most lesions result from over irrigation which causes fungi in plant and soil salinity. Recently; some very important terms emerged and changed most agricultural concepts such as the sustainable agriculture, green cities and smart irrigation systems. Most of these systems improved the quality of production and reduced lesions. In this paper a smart irrigation system was designed depending on Field Capacity F.C value, Wilting Point W.P value. In addition to the ranges of moisture that are measured in the field which are important in decision making of irrigation and selecting the best values to rely on such as threshold value in designing for the sake of maintaining moisture in the soil permanently. The best field moisture value was recorded when designing was %24 at threshold value in a clay soil field. Finally; the best types of microcontrollers ESP8266 & ESP-32S and moisture sensors, which are used to upload the data to Adafruit server. Also, the fast and light Message Queuing Telemetry Transport (MQTT) protocol, was used to transfer the ranges of moisture through the system and cloud computing.
- Published
- 2020
- Full Text
- View/download PDF
82. The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)
- Author
-
Rasha Al-Jarah and Basim Mahmood
- Subjects
complex networks ,human mobility model ,objects distribution ,routing protocols ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Nowadays, the field of Internet of Things (IoT) has become a new trend and one of the most attractive areas of research. It has a wide range of applications; starting from smart devices to developing smart cities. The main issue in this kind of applications is the limitation in network resources (e.g., energy, memory, connectivity, etc.). Most of the works in the literature deal with this issue in a traditional way. For instance, developing routing protocols that find the optimal path for data forwarding. This paper looks to this issue from a different angle. In this work, we aim at testing different mobility patterns and then investigate their impact of the consumption of network resources under particular distributions and data routing protocols. The aspect we aim to investigate and measure is the amount of data exchanged, which in turn affects the power and the memory consumption of a network. We also measure two more aspects; performance stability, and data coverage area. The results show that mobility models play a significant role in the overall network performance.
- Published
- 2020
- Full Text
- View/download PDF
83. Eye Detection using Helmholtz Principle
- Author
-
Ahmed
- Subjects
Eye detection ,General Computer Science ,General Mathematics ,Botany ,Contour Extraction, Gestalt Theory, Helmholtz Principle, Skin Detection ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,General Physics and Astronomy ,lcsh:Q ,General Chemistry ,lcsh:Science ,Agricultural and Biological Sciences (miscellaneous) ,General Biochemistry, Genetics and Molecular Biology ,Mathematics - Abstract
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through general description of these things. This paper utilizes these two principles to recognize and extract eye part from image. Java programming language and OpenCV library for image processing are used for this purpose. Good results are obtained from this proposed method, where 88.89% was obtained as a detection rate taking into account that the average execution time is about 0.23 in seconds.
- Published
- 2019
84. مدى مطابقة فقرات االختيار من متعدد في كتب الرياضيات في األردن لقواعد صياغة الفقرة.
- Author
-
مهدي محمد فهد علي
- Subjects
NOTEBOOKS ,SCHOOL year ,CONFORMITY ,TEXTBOOKS ,MATHEMATICS - Abstract
Copyright of Journal of Mu’tah Lil-Buḥūth wad-Dirāsāt: Humanities & Social Sciences Series is the property of Mutah University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
85. التفكير المنتج وعلاقته بالذكاء المنطقي الرياضي لدى طالبات الصف الرابع العلمي في مادة الرياضيات.
- Author
-
م. ابتسام عبد الك
- Subjects
PEARSON correlation (Statistics) ,ARITHMETIC mean ,SCHOOL year ,GRADING of students ,INTELLIGENCE tests ,ANALYTICAL skills - Abstract
Copyright of Journal of the College Of Basic Education is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
86. معوقات تعلم الرياضيات عن بعد في ظل جائحة كورونا ( من وجهة نظر طاب عمادة السنة 19-COVID) المشركة بجامعة الملك سعود.
- Author
-
عايض محمد الغامد
- Abstract
Copyright of Umm Al-Qura University Journal of Educational & Psychological Sciences is the property of Association of Arab Universities and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
87. مستويات التفكير الإبداعي الرياضي لدى طلبة المرحلة الثانوية في الرياضيات وعلاقته بتحصيل الطلبة في الرياضيات.
- Author
-
بهجت التخاينة
- Abstract
Copyright of Dirasat: Educational Sciences is the property of University of Jordan and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
88. HPPD: A Hybrid Parallel Framework of Partition-based and Density-based Clustering Algorithms in Data Streams
- Author
-
Ammar Abd Alazeez
- Subjects
big data ,hybrid clustering algorithms ,data stream clustering algorithms ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Data stream clustering refers to the process of grouping continuously arriving new data chunks into continuously changing groups to enable dynamic analysis of segmentation patterns. However, the main attention of research on clustering methods till now has been concerned with alteration of the methods updated for static datasets and changes of the available modified methods. Such methods presented only one type of final output clusters, i.e. convex or non-convex shape clusters. This paper presents a novel two-phase parallel hybrid clustering (HPPD) algorithm that identify convex and non-convex groups in online stage and mixed groups in offline stage from data stream. In this work, we first receive the data stream and apply pre-processing step to identify convex and non-convex clusters. Secondly, apply modified EINCKM to present online output convex clusters and modified EDDS to present online output non-convex clusters in parallel scheme. Thirdly, apply adaptive merging strategy in offline stage to give last composed output groups. The method is assessed on a synthetic dataset. The output results of the experiments have authenticate the activeness and effectiveness of the method.
- Published
- 2020
- Full Text
- View/download PDF
89. Applying Standard JPEG 2000 Part One on Image Compression
- Author
-
Maha Rahman Hasso and Sahlah Ali
- Subjects
jpeg 2000 part one ,convention ,field programming able gate array ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, has been proposed Algorithm for standard JPEG2000 part one for image compression. The proposed Algorithm was executed by using MATLAB7.11 environment, applied these algorithm on the gray and color images for type of the images natural, medical, Graphics images and remote sensing. Dependence on the Peak Signal-to-Noise Ratio (PSNR) for comparing the result of the proposed Algorithm by using the Daubechies filters 5/3 tap filter and 9/7 tap filter Biothogonal , Another comparison is held concerning the obtained results of the algorithm of ModJPEG and Color-SPECK. Proved the processing results Efficiency performance of proposed Algorithm.
- Published
- 2020
- Full Text
- View/download PDF
90. Medical Image Classification Using Different Machine Learning Algorithms
- Author
-
Sami Ismael, Shahab Kareem, and Firas Almukhtar
- Subjects
machine learning (ml) ,classification ,segmentation ,digital image ,image extraction ,and histogram ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The different types of white blood cells equips us an important data for diagnosing and identifying of many diseases. The automation of this task can save time and avoid errors in the identification process. In this paper, we explore whether using shape features of nucleus is sufficient to classify white blood cells or not. According to this, an automatic system is implemented that is able to identify and analyze White Blood Cells (WBCs) into five categories (Basophil, Eosinophil, Lymphocyte, Monocyte, and Neutrophil). Four steps are required for such a system; the first step represents the segmentation of the cell images and the second step involves the scanning of each segmented image to prepare its dataset. Extracting the shapes and textures from scanned image are performed in the third step. Finally, different machine learning algorithms such as (K* classifier, Additive Regression, Bagging, Input Mapped Classifier, or Decision Table) is separately applied to the extracted (shapes and textures) to obtain the results. Each algorithm results are compared to select the best one according to different criteria’s.
- Published
- 2020
- Full Text
- View/download PDF
91. Self-Scaling Variable Metric in Constrained Optimization
- Author
-
Eman Hamed and Marwa Hamad
- Subjects
optimization ,self-scaling ,constrained ,quasi newton method ,barrier method ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we investigated of a new self-scaling by use quasi-Newton method and conjugate gradient method. The new algorithm satisfies a quasi-newton condition and mutually conjugate, and practically proved its efficiency when compared with the well-known algorithms in this domain, by depending on efficiency measure, number of function, number of iteration, and number of constrained, NOF, NOI and NOC.
- Published
- 2020
- Full Text
- View/download PDF
92. On MP-Rings
- Author
-
Raida Mahmood and Azhar Hajo
- Subjects
mp-ring ,strongly regular ,w-ideal ,nbf-ring ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
An ideal I of a ring R is said to be right (left) Pure if for every , there is such that . A ring R is said to be right (left) MP-ring, if every maximal right (left) ideal of R is a left (right) pure. In this paper have been studied some new properties of MP-rings, there connections with strongly regular rings. Some of the main result of the present work are as follows: 1- Let R be aright MP-ring, r(a) is a W-ideal for all then a- Every essential ideal is a direct summand. b- R is strongly regular ring. 2- Let R be aright MP-ring. If R is right almost abelian left NBF ring, then R is strongly regular.
- Published
- 2020
- Full Text
- View/download PDF
93. Predicting Bank Loan Risks Using Machine Learning Algorithms
- Author
-
Maan Alsaleem and Safwan Hasoon
- Subjects
bank loans ,machine learning algorithms ,multilayer perceptron ,classification ,accuracy ,roc ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Bank loans play a crucial role in the development of banks investment business. Nowadays, there are many risk-related issues associated with bank loans. With the advent of computerization systems, banks have become able to register borrowers' data according their criteria. In fact, there is a tremendous amount of borrowers’ data, which makes the process of load management a challenging task. Many studies have utilized data mining algorithms for the purpose of loans classification in terms of repayment or when the loans are not based on customers’ financial history. This kind of algorithms can help banks in making grant decisions for their customers. In this paper, the performance of machine learning algorithms has been compared for the purpose of classifying bank loan risks using the standard criteria and then choosing (Multilayer Perceptron) as it has given best accuracy compared to RandomForest, BayesNet, NaiveBayes and DTJ48 algorithms.
- Published
- 2020
- Full Text
- View/download PDF
94. The Restricted Detour Polynomial of the Theta Graph
- Author
-
Herish Abdullah and Ivan Ali
- Subjects
restricted detour distance ,restricted detour polynomial ,theta graphs ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The restricted detour distance D*(u,v) between two vertices u and v of a connected graph G is the length of a longest u - v path P in G such that = P. The main goal of this paper is to obtain the restricted detour polynomial of the theta graph. Moreover, the restricted detour index of the theta graph will also be obtained.
- Published
- 2020
- Full Text
- View/download PDF
95. The Homotopy Analysis Method in Turning Point Problems
- Author
-
Rasha Ahmed and Waleed Al-Hayani
- Subjects
homotopy analysis method ,turning points ,boundary value problems ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we used the homotopy analysis method to ordinary differential equations of type boundary value problems with a parameter representing turning points."To show the high accuracy of the solution results, we compare the numerical results applying the standard homotopy analysis method with the integral equation and the numerical solution of the Simpson and Trapezoidal rules."Also, we give the estimated order of convergence (local) and the global estimated order of convergence along the interval.
- Published
- 2020
- Full Text
- View/download PDF
96. MATHEMATICS AS A DESIGN TOOL: TOWARD AN EFFECTIVE BUILDING’S AESTHETICAL PERFORMANCE
- Author
-
Aya M. Fawzy and Inas Abdel Sabour
- Subjects
mathematics ,geometry ,parametric ,algorithm ,topology ,aesthetic performance ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Integrating mathematics in architectural design and construction helped in generating various design solutions. Thus, aesthetical performance had developed with the involving of advanced mathematics fields and computational software. The main intention of this paper is to study the importance of mathematics in aesthetical architecture performance. Consequently, the research methodology carries out an analysis of different case studies that offered a better perception about the degree of mathematics effectiveness on the aesthetical performance in architecture. The research will investigate to what extent mathematics forms in architecture had actually a great effect on aesthetical architecture performance.
- Published
- 2020
- Full Text
- View/download PDF
97. Effect of Magnetic Field on Blood Flow in Stenoted Arteries
- Author
-
Rotaina Essa and Nawara Essa
- Subjects
magnetic force ,blood flow ,stenoted arteries ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, the effect of magnetic field on blood flow in stenoted arteries was studied, stokes equations in polar coordinates were used to describe such flow. All flow characteristics were found under the influence of the magnetic field and how this stenosis affects flow.
- Published
- 2019
- Full Text
- View/download PDF
98. On MLGP- Rings
- Author
-
Raida mahmood and Ebtehal Mageed
- Subjects
nj rings ,sxm rings ,local strongly regular rings ,pure ideals ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
An ideal K of a ring R is called right (left) generalized pure (GP -ideal) if for every a ∈ K, there exists m ∈ Z+, and b ∈ K such that am = am b ( am = b am) . A ring R is called MLGP-ring if every right maximal ideal is left GP-ideal. In this paper have been studied some new properties of MLGP-rings and the relation between this rings and strongly π-regular rings some of the main result of the present work are as follows: 1- Let R be a local ,MLGP and SXM ring. Then: (a) J (R) = 0. (b) If R is NJ-ring. Then r(am) is a direct sum and for all ∈ R, m ∈ Z+. 2- Let R be a local, SXM and NJ-ring . Then R is strongly π-regular if and only if R i LGP.
- Published
- 2019
- Full Text
- View/download PDF
99. A Geometric Construction of a (56,2)-Blocking Set in PG(2,19) and on Three Dimensional Linear [325,3,307]_19Griesmer Code
- Author
-
Nada Kasm Yahya and Zyiad Hamad Youines
- Subjects
arc ,bounded griesmer ,double blocking set ,projection code. projective plane ,optimal linear code ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper we give a geometrical construction of a ( 56, 2)-blocking set in PG( 2, 19) and We obtain a new (325,18)- arc and a new linear code and apply the Grismer rule so that we prove it an optimal or non-optimal code, giving some examples of field 19 arcs Theorem (2.1).
- Published
- 2019
- Full Text
- View/download PDF
100. Improving Message Embedding by using some Attributes of Color Image
- Author
-
Ahmed Abdullah
- Subjects
embedded text ,color space ,image processing method ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we are using enhancing feedback control on a new continuous 4D autonomous hyper chaotic system proposed by Sadiq A. Mehdi and A. Hayder, Qasim [Analysis of a New Hyperchaotic System with six cross-product nonlinearities terms, 2017], this system has three critical points employs ten terms include six quadratic cross-product nonlinearity terms, We notice that when we apply any linear control method that relies on a single unit control added to the system, the system behavior in this case cannot control it, so we applied enhancing linear feedback control at origin and we noticed that a necessary condition for suppression is getting positive feedback coefficient. Theoretical analysis and numerical simulation check the validity of the results obtained.
- Published
- 2019
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.