Preferred Language
Articles
/
1BZ7UIkBVTCNdQwCqIjc
New Approach for Solving Two Dimensional Spaces PDE
...Show More Authors
Abstract<p>In this paper, new approach based on coupled Laplace transformation with decomposition method is proposed to solve type of partial differential equation. Then it’s used to find the accurate solution for heat equation with initial conditions. Four examples introduced to illustrate the accuracy, efficiency of suggested method. The practical results show the importance of suggested method for solve differential equations with high accuracy and easy implemented.</p>
Scopus Crossref
View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Convergence Theorems of Three-Step Iteration Algorithm in CAT (0) Spaces
...Show More Authors

      In this paper, a modified three-step iteration algorithm for approximating a joint fixed point of non-expansive and contraction mapping is studied. Under appropriate conditions, several strong convergence theorems and Δ-convergence theorems are established in a complete CAT (0) space. a numerical example is introduced to show that this modified iteration algorithm is faster than other iteration algorithms. Finally, we prove that the modified iteration algorithm is stable. Therefore these results are extended and improved to a novel results that are stated by other researchers. Our results are also complement to many well-known theorems in the literature. This type of research can be played a vital role in computer programming

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 27 2019
Journal Name
Iraqi Journal Of Science
The convergence of Iteration Scheme to Fixed Points in Modular Spaces
...Show More Authors

     The aim of this paper is to study the convergence of an iteration scheme for multi-valued mappings which defined on a subset of a complete convex real modular. There are two main results, in the first result, we show that the convergence with respect to a multi-valued contraction mapping to a fixed point. And, in the second result, we deal with two different schemes for two multivalued  mappings (one of them is a contraction and other has a fixed point) and then we show that the limit point of these two schemes is the same. Moreover, this limit will be the common fixed point the two mappings.

View Publication Preview PDF
Scopus (9)
Scopus Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
The existence and uniqueness of common fixed points in expanded spaces
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Iraqi Journal Of Science
sp[γ,γ^(* ) ]-open sets and sp[γ,γ^(* ) ]-compact spaces
...Show More Authors

     In this work, we present the notion of sp[γ,γ^(* ) ]-open set,  sp[γ,γ^(* ) ]-closed, and sp[γ,γ^(* ) ]-closure such that several properties are obtained. By using this concept, we define a new type of spaces named sp[γ,γ^(* ) ]-compact space.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The Role of Phenotypic Traits in Interior Spaces: سهير ياسين احمد
...Show More Authors

The phenotypic characteristics in the interior spaces are seeing the result of the ability of the designer in his handling of the vocabulary and the elements to deliver a specific meaning for the recipient , and is working to stir up the receiver and make it effective in the process of perception of space. So the theme of the role of phenotypic characteristics is of great significance in the process of analyzing spaces to reach the goal of the main idea , and show those qualities through relationships design in terms of shape, color and texture ... etc. , to reach also designs more beautiful , and creating an internal environment , creative and continuous with its external environment , Hence the importance of research in that it tries t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 04 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Narrative and Electronic news Story: (Semiotic approach)
...Show More Authors

The e-news is one of the most important journalistic arts in new media (the Internet). The process of telling the story by the journalist is an important aspect of the communicative process between the users of the internet and the reporter. The electronic news is characterized by having text, fixed images, animations, videos and sound. All these give greater vitality to the communicative process and increase the semiotic dimensions. Also, it makes the narrative process more distinctive and embodied of the elements of the event. This research studies all these aspects and tries to show the distinction between the semiotics of narration and the electronic news.

View Publication
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Selective Approach in Managing Penetrating Neck Injury
...Show More Authors

Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF