Preferred Language
Articles
/
bsj-4934
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Language Teaching And Research
Islamification vs. Islamophobia: A Message to the Youth in the Occident: Critical & Rhetorical Inquiries
...Show More Authors

Drawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenography space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Elastic Properties as a Predictive Tool to Identify Pore-Fluid Type in Carbonate Formations
...Show More Authors

The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 06 2022
Journal Name
International Journal Of Professional Business Review
A Comparative Study to Reveal Earnings Management in Emerging Markets: Evidence from Tunisia and Iraq
...Show More Authors

Purpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq.   Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021)   Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark

... Show More
View Publication
Scopus (24)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
Semiotic criteria for analyzing religious symbols in press reports Qantara news site as a model
...Show More Authors

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Dyslipidemia and CA15-3 serum level in Iraqi Women with Breast Tumor: A Comparative Study
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Intelligent Systems
Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
...Show More Authors
Abstract<p>This study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to</p> ... Show More
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref