Preferred Language
Articles
/
bsj-3678
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
¬The Role of the European Union in Conflicts Resolution in the Eastern Neighborhood: Selected Models
...Show More Authors

The launch of the EU’s Eastern Partnership in 2009 intended to signal a new, elevated level of EU engagement with its Eastern neighborhood. Yet there remain several long-simmering and potentially destabilizing conflicts in the region, with which EU engagement thus far has been sporadic at best. The Union’s use of its Common Security and Defense Policy (CSDP) in the region and to help solve these disputes has been particularly ad hoc and inconsistent, wracked by inter-institutional incoherence and undermined by Member States’ inability to agree on a broad strategic vision for engagement with the area.

The three CSDP missions deployed to the region thus far have all suffered from this incoherence to various extents. In particu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad
...Show More Authors

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Computers & Mathematics With Applications
Simultaneous determination of time-dependent coefficients in the heat equation
...Show More Authors

View Publication
Scopus (40)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
FPGA Realization of Two-Dimensional Wavelet and Wavelet Packet Transform
...Show More Authors

 

The Field Programmable Gate Array (FPGA) approach is the most recent category, which takes the place in the implementation of most of the Digital Signal Processing (DSP) applications. It had proved the capability to handle such problems and supports all the necessary needs like scalability, speed, size, cost, and efficiency.

In this paper a new proposed circuit design is implemented for the evaluation of the coefficients of the two-dimensional Wavelet Transform (WT) and Wavelet Packet Transform (WPT) using FPGA is provided.

In this implementation the evaluations of the WT & WPT coefficients are depending upon filter tree decomposition using the 2-D discrete convolution algorithm. This implementation w

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Hybrid Transform Based Denoising with Block Thresholding
...Show More Authors

A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Transform Fundamental Properties and Its Applications
...Show More Authors

        In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.

Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.

View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Treatment of Furfural Wastewater by (AOPs) Photo-Fenton Method
...Show More Authors

The objective of this study is to investigate the application of advanced oxidation processes (AOPs) in the treatment of wastewater contaminated with furfural. The AOPs investigated is the homogeneous photo-Fenton (UV/H2O2/Fe+2) process. The experiments were conducted by using cylindrical stainless steel batch photo-reactor. The influence of different variables: initial concentration of H2O2 (300-1300mg/L), Fe+2(20-70mg/L), pH(2-7) and initial concentration of furfural (50-300 mg/L) and their relationship with the mineralization efficiency were studied.

 Complete mineralization for the system UV/H2O2/Fe+2 was achieved at: initi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ecological Engineering
Cadmium Removal from Contaminated Soil by Electro-Kinetic Method
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Solving B- spline functions
...Show More Authors

In this paper, we proposed to zoom Volterra equations system Altfazlah linear complementarity of the first type in this approximation were first forming functions notch Baschtdam matrix and then we discussed the approach and stability, to notch functions

View Publication Preview PDF