Preferred Language
Articles
/
ZBefEI8BVTCNdQwCSVvB
Efficient Iterative Method for Solving Korteweg-de Vries Equations
...Show More Authors

The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of non-linear partial differential equations with small amount of computations does not require to calculate restrictive assumptions or transformation like other conventional methods. In addition, several examples clarify the relevant features of this presented method, so the results of this study are debated to show that this method is a powerful tool and promising to illustrate the accuracy and efficiency for solving these problems. To evaluate the results in the iterative process we used the Matlab symbolic manipulator.

Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and In- Vitro Evaluation of Spherical Crystal Agglomerates of Ebastine by Quasi Emulsion Solvent Diffusion Method
...Show More Authors

Ebastine (EBS) is a poorly water-soluble antihistaminic drug; it belongs to the class II group according to the biopharmaceutical classification system (BCS). The aim of the present work was to enhance the solubility, dissolution rate and micromeritic properties of the drug, by formulating it as spherical crystal agglomerates by Quasi Emulsion Solvent Diffusion (QESD) method.

Spherical crystal agglomerates (SCAs) were prepared in presence of three solvents dichloromethane (DCM), water and chloroform as a good solvent, poor solvent and bridging solvent respectively.  Agglomeration of EBS involved the use of some hydrophilic polymers like polyethylene glycol 4000 (PEG 4000), polyvinyl pyrrolidine K30 (PVP K30), D-?-tocopheryl

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 18 2022
Journal Name
Journal Of Blood Medicine
Circulating miR-126-3p and miR-423-5p Expression in de novo Adult Acute Myeloid Leukemia: Correlations with Response to Induction Therapy and the 2-Year Overall Survival
...Show More Authors

Abstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aim

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Blood Medicine
Circulating miR-126-3p and miR-423-5p Expression in de novo Adult Acute Myeloid Leukemia: Correlations with Response to Induction Therapy and the 2-Year Overall Survival
...Show More Authors

The study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects, and correlate their expression with response to induction therapy. Circulating miR-126-3p and miR-423-5p were measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by real time PCR. The foldchange in differential expression for each gene was calculated using the comparative cycle threshold (CT) method (also known as the 2−CT method). For statistical purposes, the fold change was calculated using DDCT (or 2–∆∆Ct) method to find the relative expression of miRNAs. The expression fold change of miR-126-3p was 1.73-fold increase in patients than controls (p= 0.010). The expression fold change of miR-423-5

... Show More
Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Using the Critical Path Method (CPM) for scheduling the project (paving the Amil Sayid Al-Ayyam Street with a length of 1.25 km) In terms of Decresing the time
...Show More Authors

The implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Use Risk Score Method to Identify the Qualitative Risk Analysis Criteria in Tendering Phase in Construction Projects
...Show More Authors

The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tend

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Use Risk Score Method to Identify the Qualitative Risk Analysis Criteria in Tendering Phase in Construction Projects
...Show More Authors

The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The exact location and its relation to cognitive method (risk-caution) of University students
...Show More Authors

The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
PROJECT MANAGEMENT OF BALAD`S MAJOR SEWERAGE SYSTEM BY USING THE GOAL PROGRAMMING METHOD
...Show More Authors

Abstract

          The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the     life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's  management  experience is how to achieve thes

... Show More
View Publication Preview PDF
Crossref