Preferred Language
Articles
/
bsj-3980
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 21 2025
Journal Name
Al–bahith Al–a'alami
DICTION (IN ARAB SATELLITE CHANNELS) A SIGNAL SYSTEM : (study of written And oral patterns)
...Show More Authors

Communication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener o

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER: ADSORPTION POTENTIAL FOR A MIXTURE OF CHEMICALLY AND THERMALLY TREATED CLAYS TO REMOVE ORANGE G DYE FROM WASTE-WATER
...Show More Authors

This study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M  (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of AcceleDent® Device on Both Gingival Health Condition and Levels of Salivary Interleukin-1-βeta and Tumor Necrosis Factors-Alpha in Patients under Fixed Orthodontic Treatment
...Show More Authors

Background: Orthodontic tooth movement is characterized by tissue reactions, which consist of an inflammatory response in periodontal ligament and followed by bone remodeling in the periodontium depending on the forces applied. These processes trigger the secretion of various proteins and enzymes into the saliva.The purpose of this study was to evaluate the activity of alkaline phosphatase (ALP) in saliva during orthodontic tooth movement using different magnitude of continuous orthodontic forces. Materials and Methods: Thirty orthodontic patients (12 males and 18 females) aged 17-23 years with class II division I malocclusion all requiring bilateral maxillary first premolar extractions were randomly divided into three groups according to t

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
A general solution of some linear partial differential equations via two integral transforms
...Show More Authors

In this paper, a new analytical method is introduced to find the general solution of linear partial differential equations. In this method, each Laplace transform (LT) and Sumudu transform (ST) is used independently along with canonical coordinates. The strength of this method is that it is easy to implement and does not require initial conditions.

View Publication
Clarivate
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Role of the values of accounting culture in maximizing financial performance - A field study in a sample of Iraqi banks
...Show More Authors

The influence of culture on accounting systems and practices, including financial reports and accounting information through the values ​​identified by Gray and derived from social-cultural values, and the four accounting values ​​were derived from generally accepted accounting principles represented by (Conservatism, Uniformity, Secrecy, and Professionalism). Important and significant in maximizing financial performance, and measuring the extent of the role of these values ​​in improving financial performance through attention to the values ​​of accounting culture, this research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Non-newtonian Fluid Mechanics
On the stability of the BEK family of rotating boundary-layer flows for power-law fluids
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Most appropriate conditions of the binding of LH in Benign and Malignant
...Show More Authors

Test method was developed radioimmunotherapy to appoint in two groups of patients infected with a uterine tumor Great conditions in tumor tissue benign and malignant Ddh teacher radioactive iodine isotope

View Publication Preview PDF
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF