Preferred Language
Articles
/
bsj-7310
Using the Elzaki decomposition method to solve nonlinear fractional differential equations with the Caputo-Fabrizio fractional operator
...Show More Authors

The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of fractional differential equations.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Using Social Media sites by the Iraqi women and the Achieved The Use of Iraqi Women of Social Networking Sites and the Satisfactions Generated from Them.: A Survey Study of the City of Baghdad
...Show More Authors

The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
The Palestinian Elite's Use on Digital Diplomacy in the Face of the Israeli Narrative
...Show More Authors

This study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Estimating Stock Returns Using Rough Set Theory: An Exploratory study With An Evidence From Iraq Stock Exchange
...Show More Authors

‎ This research aims to estimate stock returns, according to the ‎Rough Set Theory ‎approach, ‎test ‎its effectiveness and accuracy in predicting stock returns and their potential in the ‎field of ‎financial ‎markets, and rationalize investor decisions. The research sample is totaling (10) ‎companies traded at Iraq Stock Exchange. The results showed a remarkable ‎ ‎Rough Set Theory application in data reduction, contributing to the rationalization of ‎investment ‎decisions. The most prominent conclusions are the capability of rough set theory ‎in ‎dealing with financial data and applying it for forecasting stock ‎returns.‎The ‎research provides those interested in investing stocks in financial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Open Newton Contes Formula for Solving Linear Voltera Integro-Differential Equation of the First Order
...Show More Authors

  In this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented.      The numerical solution of these equations is obtained by using Open Newton Cotes formula.      The Open Newton Cotes formula is applied to find the optimum solution for this equation.      The computer program is written in (MATLAB) language (version 6)

View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Removal of Ciprofloxacin Antibiotic from Synthesized Aqueous Solution Using Three Different Metals Nanoparticles Synthesized Through the Green Method
...Show More Authors

This study investigates the possibility of removing ciprofloxacin (CIP) using three types of adsorbent based on green-prepared iron nanoparticles (Fe.NPs), copper nanoparticles (Cu. NPS), and silver nanoparticles (Ag. NPS) from synthesized aqueous solution. They were characterized using different analysis methods. According to the characterization findings, each prepared NPs has the shape of a sphere and with ranges in sizes from of 85, 47, and 32 nanometers and a surface area of 2.1913, 1.6562, and 1.2387 m2/g for Fe.NPs, Cu.NPs and Ag.NPs, respectively. The effects of various parameters such as pH, initial CIP concentration, temperature, NPs dosage, and time on CIP removal were investigated through batch experiments. The res

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
The adsorption-desorption process as a method for separation of nitrogen-carbon dioxide gas mixture using activated carbon
...Show More Authors

Gas adsorption phenomenon on solid surface has been used as a mean in separation and purification of gas mixture depending on the difference in tendencies of each component in the gas mixture to be adsorbed on the solid surface according to its behaviour. This work concerns to study the possibilities to separate the gas mixture using adsorption-desorption phenomenon on activated carbon. The experimental results exhibit good separation factor at temperature of -40 .

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Measuring The Efficiency of The Departments of The College of Administration and Economics / University of Baghdad Using the Method of Data Envelopment Analysis (DEA), A Comparative Study
...Show More Authors

The research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on

... Show More
Scopus