Preferred Language
Articles
/
ijs-11945
A Modified Hestenes-Stiefel Conjugate Gradient Method and its Global convergence for unconstrained optimization
...Show More Authors

In this paper, we proposed a modified Hestenes-Stiefel (HS) conjugate
gradient method. This achieves a high order accuracy in approximating the second
order curvature information of the objective function by utilizing the modified
secant condition which is proposed by Babaie-Kafaki [1], also we derive a nonquadratic
conjugate gradient model. The important property of the suggestion
method that is satisfy the descent property and global convergence independent of
the accuracy of the line search. In addition, we prove the global convergence under
some suitable conditions, and we reported the numerical results under these
conditions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Entrepreneur ship and its role in a marketing performance
...Show More Authors

The current research aims through its chapters to verify the relationship and impact of strategic leadership as an independent variable in the marketing performance as a respondent variable, in a leap cement plant, and try to come up with a set of recommendations that contribute to enhancing the practice and adoption of the two variables in the organization under discussion. And based on the importance of the research topic to the community, and to the researched organization and its members, the analytical and analytical approach was adopted in the completion of this research, and the research community included a leap cement plant in Anbar Governorate, while the research sample was represented by (department heads, and people o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 25 2025
Journal Name
Al–bahith Al–a'alami
Petra University’s Students’ Uses For SMS Messages and its Verifications (A Field Study on Students of Petra University’s Colleges)
...Show More Authors

This study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.

The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fabrication of Photodetector and Study of Its Structural and Optical Properties of Cadmium Oxide Thin Films Prepared by Vacuum Thermal Evaporation Method
...Show More Authors

     The fabricated Photodetector n-CdO /-Si factory thin films Altboukaraharara spatial silicon multi- crystallization of the type (n-Type) the deposition of a thin film of cadmium and at room temperature (300K) and thickness (300 ± 20nm) and the time of deposition (1.25sec) was antioxidant thin films cadmium (Cd) record temperature (673k) for one hour to the presence of air and calculated energy gap optical transitions electronic direct ( allowed ) a function of the absorption coefficient and permeability and reflectivity by recording the spectrum absorbance and permeability of the membrane record within the wavelengths (300 1100nm). was used several the bias ranged between 1-5 Volts. The results showed that this

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Adsorption of Congo Red Dye from Aqueous Solution onto Natural and Modified Bauxite Clays
...Show More Authors

The adsorption behavior of congo red dye from its aqueous solutions was investigated onto natural and modified bauxite clays. Both bauxite and modified bauxite are primarily characterized by using, FTIR, SEM, AFM, and XRD. Several variables are studied as a function of adsorption including contact time, adsorbent weight, pH, ionic strength, particle size and temperature under batch adsorption technique. The absorbance of the solution before and after adsorption was measured spectrophotometrically. The equilibrium data fit with Langmuir model of adsorption and the linear regression coefficient R2 is found to be 0.9832 and 0.9630 for natural and modified bauxite respectively at 37.5°C which elucidate the best fitting isotherm model. The gene

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 19 2010
Journal Name
Journal Of College Of Science, University Of Babylon
H-Point Standard Addition Method for Simultaneous Determination of Cimetidine and Erythromycin Ethylsuccinate Drugs Using Bromothymol Blue as a Chromogenic Complexing Agent
...Show More Authors

The H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.

Publication Date
Sun Dec 30 2012
Journal Name
Journal Of Kufa For Mathematics And Computer
On Jeffery Prior Distribution in Modified Double Stage Shrinkage-Bayesian Estimator for Exponential Mean
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Frontiers In Cell And Developmental Biology
Hypoxia-Modified Cancer Cell Metabolism
...Show More Authors

View Publication
Scopus (374)
Crossref (379)
Scopus Clarivate Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF