Preferred Language
Articles
/
IRc9-Y8BVTCNdQwCyYKW
Numerical Solution of Non-linear Delay Differential Equations Using Semi Analytic Iterative Method
...Show More Authors

Crossref
View Publication
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of financial reporting for non-current assets impairment in enhancing the relevance accounting information
...Show More Authors

  This research deals with the financial reporting for the non-current assets impairment from the viewpoint of international accounting standards, especially IAS 36 "Impairment of assets”. The research problem focused on the non-compliance with the requirements of IAS 36 which would negatively affect the accounting information quality, and its characteristics, especially the relevance of accounting information, that confirms the necessity of having such information for the three sub-characteristics in order to be useful for the decisions of users represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 27 2020
Journal Name
Iraqi Journal Of Science
In Vitro Oncolytic activity of non-virulent Newcastle Disease Virus LaSota Strain against Mouse mammary adenocarcinoma
...Show More Authors

     Newcastle disease virus (NDV) is a wide-spectrum anti-tumor agent. The oncolytic selectivity of NDV, a family of Paramyxoviridae, depends on the differential type of inducing different death pathways. This work was conducted to further understand the oncolytic effect of LaSota strain. A mouse breast cancer model (Murine mammary adenocarcinoma cell line AMN3) was used in this study. Methyl Thiazolyl Tetrazolium (MTT) viability assay tested different NDV multiplicity of infection (MOI) values on mouse mammary adenocarcinoma cells incubated for 72 hours post-infection. The IC50 values and anti-tumor activity of LaSota strain against AMN3 cell line were determined. Following Hematoxylin and Eosin Stain, we examined t

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Effect of Magnetichydrodynamic on unsteady flow and heat transfer upon stretching sheet with non – uniform heat
...Show More Authors

In this paper we study the effect of magnetichydrodynamic upon the boundary
layer flow and heat transfer on a permeable unsteady stretching sheet with non –
uniform heat source / sink. It found that the momentum and energy equations are
controlled by many different dimensionless parameters such as prandtle number
pr , unsteadiness parameter A , constant pressure So , coefficient of the space
dependent  A , the temperature dependent  B , and the MHD parameter M . The
analytic solutions are obtained by using suitable similarity transformations and
homotopy analysis method (HAM).
Furthermore, we analysis the effects of all dimensionless number, there are
mentioned above, upon the velocity distribution and

... Show More
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATING NONPARAMETRIC AUTOREGRESSIVE CURVE BY SMOOTHING SPLINES METHOD
...Show More Authors

Preview PDF
Scopus
Publication Date
Thu May 01 1997
Journal Name
Polymer-plastics Technology And Engineering
An Efficient Method for Real Gas Pseudopressure Calculation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Fme Transactions
Unsteady nonlinear panel method with mixed boundary conditions
...Show More Authors

A new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A simple Cascade Method for Mixed Noise Removal
...Show More Authors

Images are usually corrupted by type of noise called "mixed noise ", traditional
methods do not give good results with the mixed noise (impulse with Gaussian
noise) .In this paper a Simple Cascade Method (SCM) will be applied for mixed
noise removal (Gaussian plus impulse noise) and compare it's performance with
results that acquired when using the alpha trimmed mean filter and wavelet in
separately. The performances are evaluated in terms of Mean Squane Error (MSE)
and Peak Signal to Noise Ratio (PSNR).

View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Engineering And Technology Journal
A Proposed Method for the Sound Recognition Process
...Show More Authors

View Publication
Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref