Preferred Language
Articles
/
bsj-4934
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Clinical And Experimental Dentistry
Resistance of bonded premolars to four artificial ageing models post enamel conditioning with a novel calcium-phosphate paste
...Show More Authors

Background: This in vitro study compares a novel calcium-phosphate etchant paste to conventional 37% phosphoric acid gel for bonding metal and ceramic brackets by evaluating the shear bond strength, remnant adhesive and enamel damage following water storage, acid challenge and fatigue loading. Material and Methods: Metal and ceramic brackets were bonded to 240 extracted human premolars using two enamel conditioning protocols: conventional 37% phosphoric acid (PA) gel (control), and an acidic calcium-phosphate (CaP) paste. The CaP paste was prepared from β-tricalcium phosphate and monocalcium phosphate monohydrate powders mixed with 37% phosphoric acid solution, and the resulting phase was confirmed using FTIR. The bonded premolars were exp

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (13)
Scopus Crossref
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering & Technology
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
View Publication
Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of the Solubility of Four Endodontic Sealers in Different Solvents (An In Vitro Study)
...Show More Authors

Background: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Biotechnology
Detection of E. coli and rotavirus in diarrhea among children under five years old‏
...Show More Authors

Publication Date
Fri Apr 09 2021
Journal Name
Education And Information Technologies
Evaluating the use of informational technologies by students of healthcare colleges for academic purposes over a five-year period
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Sep 05 2007
Journal Name
Neural Network World
A canonical generic algorithm for likelihood estimator of first order moving average model parameter
...Show More Authors

The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot

... Show More
Scopus (3)
Scopus
Publication Date
Mon Sep 15 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Simultaneous Determination of Ciprofloxacin Hydrochloride and Mebeverin Hydrochloride by Derivative Spectrophotometry
...Show More Authors

A new Spectrophotometric method, is for individual and simultaneous determination of Ciprofloxacin hydrochloride(CIP) and Mebeverin hydrochloride(MEB) by the first and second derivative mode techniques. The first and second derivative spectra of these compounds permitted individual and simultaneous determination of CIP and MEB in concentration range of (4-28μg/mL) by measuring the amplitude of peak- to- base line and the area under peak at selected spectrum intervals. The methods showed a reasonable precision and accuracy and have been applied to determine CIP and MEB in four different pharmaceutical preparations.

Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Arab Science Heritage Journal
عن البيت الأول وأبوّته
...Show More Authors

كيف بنى الشاعر العربي القديم قصيدته موسيقيا ؟ ولماذا تقوم هذه القصيدة على معمار إيقاعي معين دون غيره ؟ ولماذا صار ذلك البناء سمة لتشكيل ذائقتنا الشعرية وترديد مسارها ـ الذي لا يكاد يشابهه ما لدى الأمم الأخرى ـ حتى عصرنا الراهن هذِا ؟ وما علاقة البناء الموسيقي بالانفعالات الشعورية والنفسية المشتجرة في ذات المبدع ؟

View Publication Preview PDF
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF