Preferred Language
Articles
/
bsj-3714
Convergence Analysis for the Homotopy Perturbation Method for a Linear System of Mixed Volterra-Fredholm Integral Equations
...Show More Authors

           In this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
Among the hadiths of righteous deeds mentioned in the expiation of sins -An analytical study-
...Show More Authors

The almighty Al-Bari imposed on Muslims easy and accessible worshipers for every individual who is eligible to commission, so whoever performed it rightfully, God rewarded it with the best reward. From the Muslim, the Almighty made the Almighty to the types of acts of worship and acts of righteousness as a reason for the remission of sins that were advanced and late, so I chose a topic (from the hadiths of righteous deeds mentioned in the atonement of sins) as a research drawn from the master’s thesis called (the hadiths of the atoners of sins that were presented and delayed - An analytical study- ), And collect in this research kinds of acts of righteousness that bring the mercy of God Almighty to His servants and be a reason for the

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research
Synthesis, Spectroscopic Studies and Biologically Active of Uracil and Mixed Ligand with Aluminum (III)
...Show More Authors

New complexes of Al(III) such as [Al (Ura) (Phen) (OH2) Cl ] Cl. 2H2O, [Al(Ura)2(OA)(OH2)Cl].H2O and [Al(Ura)3Cl3]H2O type, where (Ura)=Uracil, (Phen)= 1,10-Phenanthroline monohydrate and (OA)= Oxalic acid dihydrate, were prepared. The elemental microanalysis, FT.IR, electronic spectra, and magnetic susceptibility as well as the conductivity measurements are characterized. For isolated three complexes for six coordinated of Al(III) are proposed with molecular formulas that depend on the nature of (Ura), (Phen) and (OA) present. The suggested molecular structure into all complexes for aluminum ion is octahedral geometries .The antibacterial efficacy was examined from metal salt (AlCl3), ligands and metal complexes into the pathogenic bacteri

... Show More
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
مجلة العلوم الاقتصادية والإدارية
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Mon Oct 07 2024
Journal Name
Semiconductor Science And Technology
A facile method of deriving solar selective nickel-cobalt oxide thin films via spraying process
...Show More Authors
Abstract<p>The present study focuses on synthesizing solar selective absorber thin films, combining nanostructured, binary transition metal spinel features and a composite oxide of Co and Ni. Single-layered designs of crystalline spinel-type oxides using a facile, easy and relatively cost-effective wet chemical spray pyrolysis method were prepared with a crystalline structure of M<sub>x</sub>Co<sub>3−x</sub>O<sub>4</sub>. The role of the annealing temperature on the solar selective performance of nickel-cobalt oxide thin films (∼725 ± 20 nm thick) was investigated. XRD analysis confirmed the formation of high crystalline quality thin films with a crystallite si</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Aug 14 2025
Journal Name
Modern Sport
Impact style of the changeable resistance in the development some of physical &amp; functional changes for the National team for the badminton
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Subjective Objective Conditions for the Possibility of Punishment
...Show More Authors

Objective conditions for the possibility of punishment are legal or material facts –positive or negative that depart from the activity of the offender. The legislator comments on their subsequent verification on the formation of some crimes the possibility of.The application of punishment to the offender , but although they are facts of an object nature that approach and overlap with many systems and cases , they are distinguished by a certain subjectivity that differentiates them from each case that may seem similar or approach them. To clarify the ambiguity that may surround these conditions , Which may lead to confusion between them and what be similar to other cases due to the common effect that they have in common , which is the f

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2008
Journal Name
Journal Of Educational And Psychological Researches
التلوث البيئي ومخاوف المرآة من الانجاب
...Show More Authors

         أن نظرة المرأة اليوم نحو الحمل والانجاب قد تغيرت نتيجة بعض العوامل وكان التلوث البيئي من أكثر العوامل تأثيرآ ، لانه يمثل أكثر الاخطار التي تبيد الجنس البشري وتقطع جذوره وتهدم سلالته الاصليه من خلال عملية التغاير في الجينات الوراثية وانتقالها عبر الاجيال . وأن أثاره لم تقتصر على الجانب الصحي للأم بل تعداه الى الجانب النفسي فاتجاهات الامهات اليوم نحو الحمل والانجاب ليس كما هو ف

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A comparison between Bayesian Method and Full Maximum Likelihood to estimate Poisson regression model hierarchy and its application to the maternal deaths in Baghdad
...Show More Authors

Abstract:

 This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.

The comparison was done by  simulation  using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the  Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood  with sample size  (n = 30) is the best to represent the maternal mortality data after it has been reliance value param

... Show More
View Publication Preview PDF
Crossref