Preferred Language
Articles
/
FRco-Y8BVTCNdQwCG4I-
The Approximate Solution of Newell Whitehead Segel and Fisher Equations Using The Adomian Decomposition Method
...Show More Authors

In the present work, we use the Adomian Decomposition method to find the approximate solution for some cases of the Newell whitehead segel nonlinear differential equation which was solved previously with exact solution by the Homotopy perturbation and the Iteration methods, then we compared the results.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Chemistry And Materials Research
Simple RP-HPLC Method for Estimation of Furosemide, Carbamazepine, Diazepam and Carvedilol in Bulk and Pharmaceutical Dosage Forms
...Show More Authors

A simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and li

... Show More
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using the Balanced Performance Approach to Increase the Effectiveness of Strategic Planning in order to Maximize the Job Satisfaction Rates at the Faculties of Bisha University
...Show More Authors

Purpose: To use the balanced measurement approach as a strategic link for increasing the effectiveness of strategic planning in the direction of achieving satisfaction rates at Bisha University in Saudi Arabia

Design / methodology / approach –The questionnaire survey was used to collect the data of the study from the faculty members at University of Bisha.

Findings –Prove the assumption that the use of the balanced measurement approach - as a strategic planning tool - leads to maximize the satisfaction rates among faculty members at the University of Bisha.

Research limitations/implications-  adopt effective strategic planning in order to achieve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Compare Linear Progamming With Other Methods to Finding Optimal Solution for Transportation Problem
...Show More Authors

The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Reality Of Using Educational Technology In Teaching Mathematics From The Point Of View Of Mathematics Teachers In Amman
...Show More Authors

The study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect of Using Air Guide Net in Front of the Condenser on the Performance of Automobile Air Conditioning System
...Show More Authors

 

The work of this paper is an investigation to improve the condenser performance of the automobile air conditioning system by enhancing the air-side heat transfer from the condenser through the use of an air guide net installed in front of the condenser face which is basically an aluminum plate having a circular entrance shape for the air passage.  The A/C system was examined under two types of test. The first test was conducted the air guide net, while the second was done with the air guide net. The performances of the A/C system under these tests were compared. For the second type of test, the experiment was carried out with three different size of air guide net, three different circular diameters (2, 3 and 3.5 cm) a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 11 2025
Journal Name
Journal Of Physical Education
The Effect of Using Especial Exercises Suggested for Developing of Accuracy Direction by Fencing in Foil for the Players of the National Team of the Young who Handicap
...Show More Authors

View Publication
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
The relationship of using the social networking site Facebook to the accumulation of social capital: (Survey study for a sample of students from the University of Algiers 3)
...Show More Authors

The subject of social capital is of great importance, as it provides an analytical framework for researchers interested in understanding the impact of the Internet on many dimensions of human and social life. And because social networking sites have infiltrated societies and produced new variables at the level of human and social communication, this study came to examine the relationship between the use of the social networking site Facebook and the accumulation of social capital among a sample of University of Algeria 3 students, by researching the variables of intensity of use and patterns of use as independent variables and their relationship to social capital. The results of the field study revealed a strong relationship between the

... Show More
View Publication Preview PDF
Crossref