Preferred Language
Articles
/
cxdlFo8BVTCNdQwCPVtH
Modification Adomian Decomposition Method for solving Seventh OrderIntegro-Differential Equations
...Show More Authors

In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.

View Publication
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
The Impact of a Counseling Program with a Cognitive Reconstruction Method on the Development of the Psychological Hardness among Middle School Students
...Show More Authors

The current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
THE METHOD OF EXPRESSION IN INNATE AND POPULAR IRAQI SCULPTURAL CONTEMPORARY STUDYING BETWEEN (Hadi KadhimNassif) and (Ibrahim al nakash): كفاح عبد المجيد
...Show More Authors

The innate art,is a major tributary in the art world, It is a bold achievement, has a special flavor, With self-identity, linked to the origins and roots of human ,That goes back to the past and the history and culture of peoples. This business is not limited to only aesthetic side, but is loaded with religious and magical experience, and have social functions, This creations stayed live, breathe, grow, and change with the transformation of society, these processors emerged, from local people have not been trained academically.Their Elvis came from community culture,Which are, Mesopotamian thoroughbreds.This culture that we desperately need today, in order to increase ourselves Iraqi force, In the face of the modern world, which is locke

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Removal of Cu2+, Pb2+ , And Ni 2+ Ions From Simulated Waste Water By Ion Exchange Method On Zeolite And Purolite C105 Resin
...Show More Authors

The removal of heavy metal ions from wastewater by ion exchange resins ( zeolite and purolite C105), was investigated. The adsorption process, which is pH dependent, shows maximum removal of metal ions at pH 6 and 7 for zeolite and purolite C105 for initial metal ion
concentrations of 50-250 mg/l, with resin dose of 0.25-3 g. The maximum ion exchange capacity was found to be 9.74, 9.23 and 9.71 mg/g for Cu2+, Pb2+, and Ni2+ on zeolite respectively, while on purolite C105 the maximum ion exchange capacity was found to be 9.64 ,8.73 and 9.39 for Cu2+, Pb2+, and Ni2+ respectively. The maximum removal was 97-98% for Cu2+ and Ni2+ and 92- 93% for Pb2+ on zeolite, while it was 93-94% for Cu2+, 96-97% for Ni2+, and 87-88% for Pb2+ on puroli

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Evaluation the Initial Values for Eccentric Anomaly for an Ellipse Orbit: Article Review
...Show More Authors

The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the

... Show More
View Publication
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
The Approximated Solution for The Nonlinear Second Order Delay Multi-Value Problems
...Show More Authors

This paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Modern Sport
The effect of exercises according to the differentiated education method in developing agility and learning the collar skill of students in rhythmic gymnastics
...Show More Authors

The second half of the last century witnessed a great scientific revolution that was able to bring about wide changes in various fields, including the field of physical education, which plays a fundamental role in the process of change for the better, and which knocked all the doors of modern science in various aspects and from this perspective we see that students have different capabilities And interests and motives, which require providing a differentiated education, and this depends on the necessity of knowing each student and on the school’s ability to know appropriate strategies for teaching each student so there is no single way to teach so the research problem comes in experimenting with an educational method that works on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Administration And Economics
Using the Maximum Likelihood Method with a Suggested Weight to Estimate the Effect of Some Pollutants on the Tigris River- City of Kut
...Show More Authors

The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
Analytical Methods In Environmental Chemistry Journal
Evaluation and quantification of Fe3O4 concentrations in deposits formed inside Iraqi gas supply pipelines using a chemiluminescence method based on flow injection analysis
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Use Of the Bayesian Method and Restricted Maximum Likelihood in estimating of mixed Linear Components with random effects model with practical application.
...Show More Authors

In this research we study a variance component model, Which is the one of the most important models widely used in the analysis of the data, this model is one type of a multilevel models, and it is considered as linear models , there are three types of linear variance component models ,Fixed effect of linear variance component model, Random effect of linear variance component model and Mixed effect of linear variance component model . In this paper we will examine the model of mixed effect of linear variance component model with one –way random effect ,and the mixed model is a mixture of fixed effect and random effect in the same model, where it contains the parameter (μ) and treatment effect (τi ) which  has

... Show More
View Publication Preview PDF
Crossref