Volume 19 Issue 1
Published: 2025-06-01
Contents
Research Paper
Reactive routing protocol is one of the most important parameters in MANET, so a study of their performance is done in the next sub sections using NS2
MOHAMMED JABER ALAWADI
Mobile ad hoc network is a creation of portable devices; they create a network with infrastructure on the fly that are ever changing. As in the previous network structure, each node performs both...
Investigation a Conjuacy a Conjugacy Coefficient for Conjugate Gradient Method to Solving Unconstrained Optimization Problems
Mays Basil Jarjis, Hamsa Th. Chilmerane
In this research, a new conjugacy coefficient is derived for conjugate gradient method(C.G) and a new direction was obtained. In theory, this direction achieve sufficiently desent condition by...
Generalization of the Transformation Method to the Stratonovich Formula for Solving Stochastic Differential Equations
Ali mahmood alojedi, Abdulghafoor J. Salim
In this research, the reducible method or what is called the transformation method was generalized to the Stratonovich formula used to solve stochastic differential equations (SDEs), and the...
Complex dynamics of a family Cubic-Logistic map
baraa salim ahmed, Salma Muslih M. Farris
In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_ (x)=x^2 (1-x):>0,xR}. In this work we study the complex dynamics of this family i.e. L= {L_ (z)=z^2...
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept
Aliaa Shaker Mahmoud, Mohammed Chachan Younis
Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the...
Haemoglobin Levels Analysis Using Robust Partial Least Square Regression Models
Taha Huseein Ali, Mahammad Mahmoud Bazid
The Robust Partial Least Square Regression method is used to handle outliers and increase the explanation proportion, but it does not reduce the average of the mean square error. In this article,...
Minimising Security Deviations in Software-Defined Networks Using Deep Learning
mohammed sami alghaloom
This study aims to enhance the security of Software-Defined Networks (SDN) byemploying deep learning techniques to detect cyber threats and mitigate attacks. A comprehensive data analysis was...
Dealing with Outliers in ARMA Time Series Analysis Using Hampel Filter and Wavelet Analysis
Heyam Abd Al-Majeed A.A.Hayawi
Outliers affect the accuracy of the estimated parameters of ARMA time series models which can be handled by the Hampel filter. In this article, wavelet shrinkage is proposed to handle outliers of...
A Novel Lotka-Volterra Model for Analyzing the Dynamic Relationship Between Financial Corruption and Society.
Dilbar M.sharif Abdullah, Faraj Y. Ishak
we introduce a new predator-prey system and prove the existence, uniqueness, and stability of the proposed system. The main tools used in the study are the Picard approximation iteration and the...
A Computer System for Measuring the Relationship of Smell and Pain
ADRIAN DAVID CHEOK, Timothy Adeyi
Smell is popularly believed to influence pain, even though several of these claims currently lack significant scientific or engineering support. This paper proposes a computing system for...
AI-Driven Non-Invasive Diagnosis of Diverse Medical Conditions Through Nail Image Analysis with High-Performance Ensemble Classifier
Abeer Mohamad Alshiha, Wai Lok Woo
In this research, the application of deep learning methods for the classification of human nail diseases using image analysis is investigated. The aim was to establish a non-invasive, automatic...
Improved Dai–Liao Conjugate Gradient Methods for Large-Scale Unconstrained Optimization
Basim A. Hassan, Alaa Luqman Ibrahim, abd elhamid mehamdia
This research introduces and evaluates two enhanced conjugate gradient methods for unconstrained optimization, building upon the DaiLiao conjugacy condition and further refined through the...
Review Paper
Artificial Intelligence for Smoking Detection: A Review of Machine Learning and Deep Learning Approaches
Mohammed Sami Al-Hayali, Fawziya Mahmood Ramo
Cigarette smoking poses a major challenge to public health worldwide and has serious health consequences. Recent advances in deep learning, machine learning, Artificial Intelligence (AI), big data...
Student attendance and evaluation system : A review
Sura Hasan Falih, Yaseen Hikmat Ismael
In recent years, technologies have brought about significant changes in education, with digitization becoming a key feature that can enhance the quality and effectiveness of the educational...
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review
Akhlas Tariq Hasan, Shayma Mustafa Mohi-Aldeen
Software bug prediction (SDP) techniques identify bugs in the early stages of the software development life cycle through a series of steps to produce reliable and high-quality software. Deep...
The strongly Tri-nil clean rings
Rana Mahammed Shafik, Nazar H. Shuker
This study explores the structure and properties of strongly Tri-nil clean rings. A ring is defined as strongly Tri-nil clean if every member in a ring can be expressed as the sum of a tripotent...
Machine Learning Techniques for Kinship Verification: A Review
Olivia Khalil Oraha, Yusra Faisal Mohammad
Kinship verification is an automatic determining process of people relationships, if two or more individuals are in kin relation or not. Since the verifying of a kinship is the most challenging...
Credit card fraud Detection using Feature select method and improved machine learning algorithm
Mohammed mansooor AL-Hammadi
In todays digital age, credit card fraud has become a serious issue, posing financial risks to individuals, businesses, and financial institutions alike. Detecting credit card fraud is crucial to...
The Performance of Different Video Segmentation or Video Shot Boundary Detection Techniques: A Survey
Rafal Ali Sameer
Video is a way to convey information on the internet which is more popular than the text. Video processing expanded with the using of videos in various fields and highly developing of communication...