Preferred Language
Articles
/
bsj-2621
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 06 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Enamel defect of primary and permanent teeth in relation to nutrients daily intake among Down's syndrome children in comparison to normal children
...Show More Authors

Background: Any child with Down's syndrome does not develop in the same manner as normal child. Therefore, the child should not be viewed as being like everyone else. Developmental enamel defects in primary teeth have been found at least twice as frequently in disabled children as in control children. Down's syndrome consumed protein more than the recommended daily allowance compared to other disabled groups. Therefore, the aim of this study was to investigate developmental defects of enamel and their relations to nutrient intake among Down's syndrome children in comparison to normal children. Materials and Methods: A sample consisted of fifty institutionalized Down's syndrome children (study group) and 50 normal children (control group)

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The guidance hierarchy to describe heart in Holly Quran,(Ungrateful hearts): The guidance hierarchy to describe heart in Holly Quran,(Ungrateful hearts)
...Show More Authors

Abstract:
In the name of God , most Gracious , most merciful
The Holy Quran conciders the celestial book which consults
languages with its accents , and consults the people with their circumstances
and it takes care of all worships.
We find that Holy Quran consults atheist human and afaithless one ,
therefore , it aspect the orabion of God to human “s heart as a results , it is
one of an incapacitation of Holly Quran in This research.
WE try to taik about special vocables which relate to hearts of
unfaithful hummance , so we mentio these vocables in a guidance hierarchy
table in the end of this research.

View Publication Preview PDF
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
Ibn Abi Shaybah's responses to Abu Hanifa in the evidence that he claimed to violate in the transactions In the doctrinal balance
...Show More Authors

Imam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.

View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent to Which the Internal audit function contributes to improving administrative performance: A field study in the Baghdad Health Department / Rusafa
...Show More Authors

Abstract:

                The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 05 2023
Journal Name
Pakistan Heart Journal
The Effect of Dynamic Lactic Training According to the Target Time to Develop the Achievement of 800m Runners Under 20 Years Old
...Show More Authors

MA Mahde, HAA Kadhim, HN Tarish…, Pakistan Heart Journal, 2023 - Cited by 4

View Publication
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Divine orders Divine orders directed to his prophets (peace be upon them): Divine orders directed to his prophets (peace be upon them)
...Show More Authors

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF