Preferred Language
Articles
/
bsj-2061
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
The Effect of Rubber Crumbs on Marshall Properties for Warm Mix Asphalt
...Show More Authors

A new pavement technology has been developed in Highway engineering: asphalt pavement production is less susceptible to oxidation and the consequent damages. The warm mix asphalt (WMA) is produced at a temperature of about (10-40) oC lower than the hot asphalt paving. This is done using one of the methods of producing a WMA. Although WMA's performance is rather good, according to previous studies, as it is less susceptible to oxidation, it is possible to modify some of its properties using different materials, including polymers. Waste tires of vehicles are one of the types of polymers because of their flexible properties. The production of HMA, WMA, and WMA modified with proportions of (1, 1.5, and 2%) of rub

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Chaos, Solitons & Fractals
Modeling and analysis of an <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si7.svg"><mml:mrow><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:msub><mml:mi>I</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mi>R</mml:mi></mml:mrow></mml:math> epidemic model with nonlinear incidence and general recovery functions of <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si8.svg"><mml:msub><mml:mi>I</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math>
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the group 𝓢𝓛(2,38)
...Show More Authors

Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Cutaneous leishmaniasis: Comparative Techniques for Diagnosis
...Show More Authors

AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14

View Publication
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The Sixth Conference Of The Faculty Of Languages
Utilizing Computers for Developing Students Skills
...Show More Authors

NAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010

View Publication
Publication Date
Tue Feb 10 2026
Journal Name
Al–bahith Al–a'alami
Cultural and educational values for children
...Show More Authors

Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 21 2012
Journal Name
Arabian Journal For Science And Engineering
A Procedure for Analysing Reinforced Embankments
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref