Preferred Language
Articles
/
YBfnApABVTCNdQwCfIKZ
The Linear Delay Fourth Order Eigen-Value Problems Solved By the Collocation Method
...Show More Authors

Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Problems which Confront Renal Transplant Recipients
...Show More Authors

Objective: The study objectives are to identify the problems which confront renal transplant recipients
( RTRS).
Methodology: A descriptive study was carried out at two Teaching Hospitals with kidney transplant
centers. Surgical specialties and Al-Karama outpatients,
clinics for ( RTRS) ,and three Teaching
Hospitals; Medical city, Al-Karama and Al-Yermok which were responsible for immunosuppressive
drugs distribution .Starting from October ,1st
2006 to the end of July 2007.To achieve the objectives
of study, a non-probability (purposive) sample of 150 ( RTRS) who were attending to the outpatient
clinic of the above listed hospital were selected according to the criteria of the study sample .
The finalized q

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Listening Comprehension Problems with English lectures
...Show More Authors

The purpose of this study is to investigate learners' listening comprehension problems with Englishlectures. The study was guided by research question (What are the listening comprehension problems learners have with lectures in English).Furthermore; the main significant goal were declared through conducting this study, as well as providing some procedures of distribution the questionnaire of the study.Moreover, it presents several definitions of listening. This study definitely depends on questionnaire instrument to gathering the required data. The participants of the study were 30 learners completed their secondary school and joined at the college. Based on the findings among the five factors (text, speaker, task, environment, and list

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study of the x-ray diffraction lines of calcium titanate nanoparticle using SSP method and Scherrer method
...Show More Authors

In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Fri Dec 16 2022
Journal Name
Journal Of The College Of Languages (jcl)
The official business style of the Russian literary language. Problems of formation.: Официально-деловой стиль русского литературного языка. Проблематика формирования.
...Show More Authors

In the article we consider features of official style, its functions and factors which influence the definition of the style. The topicality of the issue can be explained by rapid development of market economy which affects in its turn business correspondence. In this regard, there are a lot of cliché, terms and professionalisms appeared recently. Only correct usage of them can serve as a key to successful communication in Russian as well as other languages. This work highlights documents that are part of the diplomatic style such as declarations, credentials, notes, resolutions and other documents. The administrative style can include orders and instructions.

Аннотация.

 В данной статье рассмо

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (34)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Oscillation of Nonlinear First Order Neutral Differential Equations
...Show More Authors

In this paper, the author established some new integral conditions for the oscillation of all solutions of nonlinear first order neutral delay differential equations. Examples are inserted to illustrate the results.

View Publication Preview PDF
Crossref
Publication Date
Sat May 28 2022
Journal Name
Abstract And Applied Analysis
Discretization Fractional-Order Biological Model with Optimal Harvesting
...Show More Authors

In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.

View Publication
Scopus (2)
Scopus Crossref