Preferred Language
Articles
/
ijs-1483
On Analytical Solution of Time-Fractional Type Model of the Fisher’s Equation
...Show More Authors

In this paper, the time-fractional Fisher’s equation (TFFE) is considered to exam the analytical solution using the Laplace q-Homotopy analysis method (Lq-HAM)”. The Lq-HAM is a combined form of q-homotopy analysis method (q-HAM) and Laplace transform. The aim of utilizing the Laplace transform is to outdo the shortage that is mainly caused by unfulfilled conditions in the other analytical methods. The results show that the analytical solution converges very rapidly to the exact solution.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 08 2018
Journal Name
International Journal Of Science And Research
effect of steel fiber type on compressive strength and modules of rupture on reactive powder concrete
...Show More Authors

Publication Date
Wed Apr 29 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Alternating Directions Implicit Method for Solving Homogeneous Heat Diffusion Equation
...Show More Authors

     An Alternating Directions Implicit method is presented to solve the homogeneous heat diffusion equation when the governing equation is a bi-harmonic equation (X) based on Alternative Direction Implicit (ADI). Numerical results are compared with other results obtained by other numerical (explicit and implicit) methods. We apply these methods it two examples (X): the first one, we apply explicit when the temperature .

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 13 2022
Journal Name
وقائع المؤتمر العلمي الدولي التاسع / المجلة الامريكية الدولية للعلوم الانسانية والاجتماعية
The Relationship between Job Satisfaction and Organizational Loyalty among Baghdad University Employees in light of Covid- 19 A Descriptive Analytical Study (University of Baghdad as a model)
...Show More Authors

The educational service industry is one of the most negatively affected industries by the spread of the COVID-19 pandemic. Government agencies have taken many measures to slow its spread, and then restrict movement and gatherings and stop recreational activities. Furthermore, the repercussions of the curfew had a significant impact due to the interruption in actual attendance for students and employees, and the severity of the Covid-19 crisis and its (economic, social, security, humanitarian and behavioral) effects on all societies and work sectors is no secret to anyone. Iraq, like other countries, was also affected by the negative impact of Covid-19 pandemic in all fields of institutional work, especially public fields, and specifically t

... Show More
Publication Date
Tue Dec 28 2021
Journal Name
College Of Islamic Sciences
The concept of the phenomenon of nuns: an analytical ideological study
...Show More Authors

ملخص البحث باللغة الإنجليزية

The concept of the phenomenon of nuns: an analytical ideological study

Dr. Samia bint Yassin Al-Badri

Department of Islamic Doctrine & Contemporary Ideologies

College of Shariʿah & Islamic Studies

Qassim University

 

The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:

The concept of the phenomenon of nuns, an analytical doctrinal study

The study concluded with resu

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Applied Mathematics And Computation
Identification of the time-dependent conductivity of an inhomogeneous diffusive material
...Show More Authors

View Publication
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Calculation of the Time Interval of Radio Storm Emitted from Jupiter
...Show More Authors

A program in Visual Basic language was designed to calculate the time interval of radio storm by predict their type at specific Local Time (LT) from Baghdad location, such storms result from the Central Meridian Longitude (CML) of system ΙΙΙ for Jupiter and phase of Io’s satellite (ФIo). These storms are related to position of Io (Io- A,B,C,D). The input parameters for this program were the observer’s location (longitude), year, month and day. The output program results in form of tables provide the observer information about the date and the LT of beginning and end of each type of emitted storm. The year 2011 was taken to apply the results within twelve month; the results of the time interval of radio storm were between (0.08h-5

... Show More
View Publication Preview PDF