Preferred Language
Articles
/
ijs-2659
The Continuous Classical Boundary Optimal Control of Triple Nonlinear Elliptic Partial Differential Equations with State Constraints
...Show More Authors

    Our aim in this work is to study the classical continuous boundary control vector  problem for triple nonlinear partial differential equations of elliptic type involving a Neumann boundary control. At first, we prove that the triple nonlinear partial differential equations of elliptic type with a given classical continuous boundary control vector have a unique "state" solution vector,  by using the Minty-Browder Theorem. In addition, we prove the existence of a classical continuous boundary optimal control vector ruled by the triple nonlinear partial differential equations of elliptic type with equality and inequality constraints. We study the existence of the unique solution for the triple adjoint equations related with the triple state equations.

The Fréchet derivative is obtained. Finally we prove the theorems of both the necessary and sufficient conditions for optimality of the triple nonlinear partial differential equations of elliptic type through the Kuhn-Tucker-Lagrange's Multipliers theorem with equality and inequality constraints.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Plagiarism Detection Methods and Tools: An Overview
...Show More Authors

Plagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (16)
Scopus Crossref
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 27 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 25 2023
Journal Name
Results In Chemistry
Synthesis and characterization of (E)-4-(((4-(5-mercapto-1, 3, 4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol as a novel corrosion inhibitor for mild-steel in acidic medium
...Show More Authors

Metal corrosion is a destructive process for many industrial operations, including oil well acidizing and acid pickling. Therefore, numerous efforts made by many researchers to control the steel corrosion. In the present work, A (E)-4-(((4-(5-mercapto-1,3,4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol (MOPM) has been synthesized and characterized as a new corrosion inhibitor for mild steel in 0.1 M hydrochloric acid. FTIR and 1 HNMR were used in the diagnosis of MOPM, while electrochemical polarization technique was employed to test the performance of inhibitor at various temperatures and inhibitor concentrations. Electrochemical studies showed that MOPM acts as a mixed-type inhibitor with a maximum inhibition efficiency of

... Show More
Publication Date
Tue Dec 13 2022
Journal Name
Dental Hypotheses
Comparative Evaluation of Marginal Microleakage Between Bulk-Fill, Preheated Bulk-Fill, and Bulk-Fill Flowable Composite Resins Above and Below Cemento-Enamel Junction Using Micro-Computed Tomography: An In Vitro Study
...Show More Authors

Objective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
In vivo study of compounds 3-(acetyl Salicyloyl)-5,6 –Oisopropylidene-L-ascorbic acid ,2,3- (acetyl Salicyloyl)-5,6 –O-isopropylidene-L-ascorbic acid and 2,3,5,6Tetra(acetyl Salicyloyl)-L-ascorbic acid
...Show More Authors

     In vivo study was made for the coumpounds 3-(ocetyl Salicyloyl)-5,6-O-isoprpy lideneL-ascorbicocid,2,3-(acetyl Salicyloyl )-5,6-o- isopropylidene-L-ascorbic acid and 2,3,5,6(acetyl Salicyloyl )-L- ascorbic acid .And a measurement was mod for the concentration of the liberated aspirin in blood samples a fter (2,3,4,6,8,10) hours of the initial dose for the animal .The results showed that the highest concentration of aspirin was after four hours of giving the dose to the animal which is in accordance with pharmacokinetics studies

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis and identification of some new N-substituted quinazoline-4-one, thiazine-4-one and tetrazoline rings incorporating N-ethyl-2-(benzylthio)benzimidazole acetate and study their application as anti-oxidant agent
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref