Preferred Language
Articles
/
bsj-6932
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Study of the marketing supply chain of the fuel oil productUsing transport models
...Show More Authors

The marketing logistic chain, as an integrated system aimed to balance the achievement of its main opposite objectives which represented in the access to the best service presented to the customer with lowest possible logistic costs especially the transportation costs, where encourages the researcher to choose the second objective as a field of this study in order to reduce the transportation costs in the final link of marketing logistic chain which related to delivering of fuel oil to the customer that falls within organizational responsibilities of the company under consideration (Oil Marketing Company) and also known in a brief name by (SOMO) through two methods, the first is by functioning quantative techniques by using trans

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Teaching difficulties of cities geography as perceived by female student
...Show More Authors

The research aims to explore the difficulties that encounter teaching geography of cities as perceived by female students. A total of (113) third stage female students / Geography Dept / college of education for women were chosen as a sample for the study. To collect the required data, a questionnaire was used as an instrument; it consisted of six parts represent teaching difficulties. It was a three-point Likert scale instrument with 1 signifying ‘main difficulty, 2 ‘sub-difficulty, and 3 ‘no difficult'. The difficulties organized in descend order, to analyze data, SPSS tool was used. The results revealed that the difficulties of content ranged (2.15-1.18), difficulties of education techniques ranged (2.47-2.04), difficulties of t

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Baghdad Science Journal
Bernoulli Polynomials Method for Solving Integral Equations with Singular Kernel
...Show More Authors

هناك دائما حاجة إلى طريقة فعالة لتوليد حل عددي أكثر دقة للمعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة لأن الطرق العددية لها محدودة. في هذه الدراسة ، تم حل المعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة باستخدام طريقة متعددة حدود برنولي. الهدف الرئيسي من هذه الدراسة هو ايجاد حل تقريبي لمثل هذه المشاكل في شكل متعددة الحدود في سلسلة من الخطوات المباشرة. أيضا ، تم افتراض أن مقام النواة

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2012
Journal Name
2012 International Conference On Statistics In Science, Business And Engineering (icssbe)
A proposal method for selecting smoothing parameter with missing values
...Show More Authors

In this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Processing of missing values in survey data using Principal Component Analysis and probabilistic Principal Component Analysis methods
...Show More Authors

The idea of ​​carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component  Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Chemical Methodologies
Study of Optical and Structural Properties of CdTe Quantum Dots Capped with 3MPA Using Hydrothermal Method
...Show More Authors

Quantum dots (QDs) can be defined as nanoparticles (NPs) in which the movement of charge carriers is restricted in all directions. CdTe QDs are one of the most important semiconducting crystals among other various types where it has a direct energy gap of about 1.53 eV. The aim of this study is to exaine the optical and structural properties of the 3MPA capped CdTe QDs. The preparation method was based on the work of Ncapayi et al. for preparing 3MPA CdTe QDs, and hen, the same way was treated as by Ahmed et al. via hydrothermal method by using an autoclave at the same temperature but at a different reaction time. The direct optical energy gap of CdTe QDs is between 2.29 eV and 2.50 eV. The FTIR results confirmed the covalent bonding betwee

... Show More
View Publication Preview PDF
Scopus (7)
Scopus