Preferred Language
Articles
/
bsj-7543
Newton-Kantorovich Method for Solving One of the Non-Linear Sturm-Liouville Problems
...Show More Authors

Due to its importance in physics and applied mathematics, the non-linear Sturm-Liouville problems
witnessed massive attention since 1960. A powerful Mathematical technique called the Newton-Kantorovich
method is applied in this work to one of the non-linear Sturm-Liouville problems. To the best of the authors’
knowledge, this technique of Newton-Kantorovich has never been applied before to solve the non-linear
Sturm-Liouville problems under consideration. Accordingly, the purpose of this work is to show that this
important specific kind of non-linear Sturm-Liouville differential equations problems can be solved by
applying the well-known Newton-Kantorovich method. Also, to show the efficiency of applying this method
to solve these problems, a comparison is made in this paper between the Newton-Kantorovich method and the
Adomian decomposition method applied to the same non-linear Sturm-Liouville problems under consideration
in this work. As a result of this comparison, the results of the Newton-Kantorovich method agreed with the
results obtained by applying Adomian’s decomposition method.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
اعتماد طريقة جمع المصالح ضرورة لتطوير الجانب المنطقي لمعيار الإبلاغ المالي الدولي رقم 3 (اندماج الأعمال)
...Show More Authors

اندماجات الأعمال من المظاهر الطبيعية في غالبية دول العالم، ورغم المنافع الكثيرة لاندماجات الأعمال إلا أن المخاطر التي تنتج منها أدت إلى تعقد الإجراءات القانونية لتنفيذها بشكل كبير، كما تعد المعالجة المحاسبية للاندماج من القضايا المعقدة جداً وتثير جدلاً واسعاً في الفكر المحاسبي لا سيما في ظل وجود مدخلين يؤثران في متضمنات المعالجة المحاسبية للاندماج أولهما المدخل القانوني الذي يقسم الاندماج إلى ثلاثة أشك

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2006
Journal Name
أثر استعمال طريقة التعلم التعاوني في تحصيل طلاب الصف الخامس الأدبي في مادة قــواعــد اللغــة العربيـــة
أثر استعمال طريقة التعلم التعاوني في تحصيل طلاب الصف الخامس الأدبي في مادة قــواعــد اللغــة العربيـــة
...Show More Authors

Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study of some structural , optical , Electrical Properties of CdS thin films deposited by chemical Spray Pyrolysis Method
...Show More Authors

In this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and characterization Studies of Metal Complexes with Schiff base derived from 4-[5-(2-hydoxy-phenyl)-[1,3,4-oxadiazol-2-ylimino methyl]-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one
...Show More Authors

New metal complexes of the ligand 4-[5-(2-hydoxy-phenyl)-[1,3,4- oxadiazol -2-ylimino methyl]-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one (L) with the metal ions Co(II), Ni(II), Cu(II) and Zn(II) were prepared in alcoholic medium. The Schiff base was synthesized through condensate of [4-antipyrincarboxaldehyde] with[2-amino-5-(2-hydroxy-phenyl-1,3,4- oxadiazol] in alcoholic medium . Two tetradentate Schiff base ligand were used for complexation upon two metal ions of Co2+, Ni2+, Cu2+ and Zn2+ as dineucler formula M2L2.4H2O. The metal complexes were characterized by FTIR Spectroscopy, electronic Spectroscopy, elemental analysis, magnetic susceptidbility measurements, and also the ligand was characterized by 1H-NMR spectra, and m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Al-academy
دراسة مقارنة بين التعبير اللفظي والتعبير غير اللفظي في إخراج الدراما التلفزيونية المترجمة – جاك بريفير (أنموذجاً).
...Show More Authors
يهدف البحث الى اشاعة الدراسة المقارنة للنص المترجم الى اللغة العربية لتلافي الفوارق بين النص الأصلي (الأجنبي ) والنص المترجم (العربي ) من حيث المعاني والرموز والمعالجات الفكرية ... الخ .والتأكيد على استعمال التقنيات التربوية (السمعية والبصرية ) في الترجمة الانسانية (المتخصصة ) والاستعانة بالترجمة الآلية لتجنّب متاعب الترجمة والفهم الخاطىء او المنقوص ...للوصول الى فهم واسع بتدريس مادة الاخراج التلف
... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref