Preferred Language
Articles
/
bsj-7515
The Necessary and Sufficient Optimality Conditions for a System of FOCPs with Caputo–Katugampola Derivatives
...Show More Authors

The necessary optimality conditions with Lagrange multipliers  are studied and derived for a new class that includes the system of CaputoKatugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left CaputoKatugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time  and the final state  are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks & Communications
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Ferritin Levels for Iraqi Patients with Hashimoto's Thyroiditis
...Show More Authors

Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of internal marketing in achieving customer satisfaction An exploratory study of a sample of private bank managers in Baghdad
...Show More Authors

This study examined the effect of elements of internal marketing activities on customer satisfaction through an exploratory study of banking services in the city of Baghdad, if the research problem crystallized by asking a group of questions, the most important (is there a correlation and impact between the dimensions of internal marketing and customer satisfaction, this study aims to determine The effect of internal communication, training and internal market research on customer satisfaction, represented by the quality of service, loyalty and market share, and embodied the objective of this study to identify the level of availability of internal marketing activities and programs in the research banks, data were collected using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The role of GRI standards in reporting the dimensions of sustainable development - An applied study in a number of local companies on the Iraq Stock Exchange
...Show More Authors

The current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 07 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Dental arches dimensions, forms and its association to facial types in a sample of Iraqi adults with skeletal and dental class II-division 1 and class III malocclusion(A cross sectional study)
...Show More Authors

Background: The association between facial types and dental arches forms has considerable implications in orthodontic diagnosis and treatment planning. The aim was to establish the maxillary and mandibular dental arches width and length in skeletal and dental class II division 1 and class III malocclusion groups, find out the most frequent dental arch form and facial type and the association between them and to check the gender differences. Materials and Methods: Frontal and lateral facial photographs and maxillary and mandibular occlussal photographs for 90 iraqi subjects with age 18-25 years old (45 males and 45 females) divided equally into three groups, the 1st group with class II division 1malocclusion (overjet more than 3mm but less t

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laminar Free Convection In Horizontal Annulus Filled With Glass Beads And With Annular Fins On The Inner Cylinder
...Show More Authors

An experimental and numerical study has been carried out to investigate the heat transfer by natural convection and radiation in a two dimensional annulus enclosure filled with porous media (glass beads) between two horizontal concentric cylinders. The outer cylinders are of (100, 82 and70mm) outside diameters and the inner cylinder of 27 mm outside diameter with (or without) annular fins attached to it. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at a low temperature inside a freezer. The experiments were carried out for an annulus filled with
glass beads at a range of modified Rayleigh number (4.9 ≤ Ra≤ 69), radiation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref