Preferred Language
Articles
/
bsj-3947
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Reaction Kinetics, Mechanisms And Catalysis
Development of two-step noncatalytic esterification of waste cooking oil for biodiesel preparation
...Show More Authors

An innovative two-step noncatalytic esterifcation technique was proposed to synthesize alkyl esters from free fatty acids simulated in waste cooking oil, as a pretreatment process for biodiesel production, without adding any catalyst under normal conditions of pressure and temperature. The efect of methanol:oil molar ratio, reaction time, mixing rate, and reaction temperature were investigated. The results confrmed that the conversion of the reaction was increased when increasing the methanol molar ratio and decreased in prolonged reaction temperature. High conversion (94.545%) was successfully achieved at optimized conditions of 115:1, 65:1 methanol:oil molar ratio in the frst step and second step, respectively, other conditions i

... Show More
Crossref (7)
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using GABOR Filter And Different Self Organizing Maps Neural Networks
...Show More Authors

 

This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.

The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Numerical Simulation of Ice Melting Using the Finite Volume Method
...Show More Authors

The Aim of this paper is to investigate numerically the simulation of ice melting in one and two dimension using the cell-centered finite volume method. The mathematical model is based on the heat conduction equation associated with a fixed grid, latent heat source approach. The fully implicit time scheme is selected to represent the time discretization. The ice conductivity is chosen
to be the value of the approximated conductivity at the interface between adjacent ice and water control volumes. The predicted temperature distribution, percentage melt fraction, interface location and its velocity is compared with those obtained from the exact analytical solution. A good agreement is obtained when comparing the numerical results of one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Polyaniline Nano Films Synthesis in One Step via Chemical Oxidative Polymerization
...Show More Authors

Polyaniline films were successfully synthesized in this study using an oxidative polymerization method at temperatures ranging from 0 to 4 ° C. Polyaniline films were deposited using a single step of chemical oxidative polymerization rather than electrochemical polymerization. The polyaniline was examined using FTIR, XRD, SEM, AFM, and Four Point Probe. This result demonstrates that polyaniline synthesized using this method has a uniform morphology, small size (17 to 40) nm, high crystallinity, and high conductivity (9.42 s/cm).

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 12 2022
Journal Name
Journal Of Economics And Administrative Sciences
Nonparametric Estimator (Histogram) For Estimating Probability Density Function: Nonparametric Estimator (Histogram) For Estimating Probability Density Function
...Show More Authors

 In this paper we introduce several estimators for Binwidth of histogram estimators' .We use simulation technique to compare these estimators .In most cases, the results proved that the rule of thumb estimator is better than other estimators.

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 09 2025
Journal Name
Journal Of Physical Education
A Safe Environment Scale from Professional Basketball Players and Coaches’ Point Of View
...Show More Authors

The aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (41)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
The indexing of the Al-Kindy College Medical Journal in the Scopus Database Journals: A Fundamental Step toward an International Recognition
...Show More Authors

On Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Chemical Engineering And Processing - Process Intensification
Cobalt Removal from Simulated Wastewaters Using a Novel Flow-by Fixed Bed Bio-electrochemical Reactor
...Show More Authors

View Publication
Scopus (33)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref