Preferred Language
Articles
/
BRef848BVTCNdQwCnIFF
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

In this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder (MERn) has been calculated. The results have been provided strong evidence that the RCMs and I-RCMs are credible and accurate methods for obtaining approximate solutions to this problem.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (47)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (30)
Crossref (12)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Rock facies classification and its effect on the estimation of original oil in place based on petrophysical properties data
...Show More Authors

The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
The Effects of Conductance on Metastable Switches in Memristive Devices Based on Anti-Hebbian and Hebbian (AHaH) Learning Rules
...Show More Authors

     In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
A fourth Order Pseudoparabolic Inverse Problem to Identify the Time Dependent Potential Term from Extra Condition
...Show More Authors

     In this work, the pseudoparabolic problem of the fourth order is investigated to identify the time -dependent potential term under periodic conditions, namely, the integral condition and overdetermination condition. The existence and uniqueness of the solution to the inverse problem are provided. The proposed method involves discretizing the pseudoparabolic equation by using a finite difference scheme, and an iterative optimization algorithm to resolve the inverse problem which views as a nonlinear least-square minimization. The optimization algorithm aims to minimize the difference between the numerical computing solution and the measured data. Tikhonov’s regularization method is also applied to gain stable results. Two

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The problem of elevating the status of values in scienceStudy in economic thought and macro analysis
...Show More Authors

ان من اهم القضايا التي تثيرها المعرفة البشرية في تجلياتها، وتعبيراتها المفاهيمية، تكمن في مدى تأصلها وانتمائها الى البنى والتشكيلات الموضوعية (في مستوياتها التاريخية) التي تسعى لتفسيرها وادراكها ومضاهاتها. فالينبوع الذي يغرف منه الفكر مادته هو الكيان الاجتماعي المتموضع خارج الوعي والايدولوجيا.

ان قدرة الوعي على ادراك الواقع الموضوعي بخصائصه العامة يشكل الشرط  الضروري لاكتساب الوعي ل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of The Faculty Of Languages
A Psychological Reading of The Problem of the Black in John Steinbeck’s Of Mice and Men
...Show More Authors

Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Problem of Paradox and its Manifestations: A Study in the Titles of Najm Wali's Novels
...Show More Authors

The irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.

 As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i

... Show More
View Publication Preview PDF
Crossref