Preferred Language
Articles
/
ijs-5832
The Moon, Sun and Jupiter coordinates and distances variation through 100 years
...Show More Authors

In this research calculate the ecliptic and equatorial coordinates for the Moon , Sun and Jupiter through 100 years and calculate the distances between the Moon and the Earth , the Sun and the Earth , Jupiter and the Sun, Jupiter and the Earth . From Calculation and discussion the changes in the equatorial coordinate were: Δ , Δ δJ = (22.73+21.93, 23.28+22.99) , and the maximum values and minimum values for the Moon were: Rm(min) = 0.00239,0.00240 and Rm(max) = 0.0027,0.00272 , and Jupiter RJ(min) = 4.99077,4.99966 and RJ(min) = 5.44469,5.45057 , and the periods change preface to calculate the conjunction of the Moon and Jupiter. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Detection and Quantification of Class I Caries with Laser Fluorescence Technique
...Show More Authors

The objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Apexification and Periapical Healing of Immature Teeth Using Mineral Trioxide Aggregate
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jun 12 2019
Journal Name
Al–bahith Al–a'alami
Viewing television in media convergence era Rites change and practices transformation
...Show More Authors


The present article concerns one of the objects of media sociology under construction. The transformation of the rites in the use of the television contents in the era of digital technologies and media convergence. By an analytic contextual approach, based on the study of the uses, we formulate the following hypothesis: so many changes in the rites of uses are real, in particular at the young people, so, many pieces integer of the everyday life remain impervious to these changes, and it is true under the influence of a slowness of the social and cultural orders, rooted for a long time in the traditional social fabric. We shall then try to bring a sociological look to this societal, cultural, and communicational object that is the pas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization and Biological Activities of new Nano Schiff bases Composites
...Show More Authors

     New nano composites containing Schiff bases have been synthesized and presented in this paper. All compounds have been categorized through FT-IR and some of them by H-NMR spectroscopy. The antibacterial performance of the prepared compounds has been investigated according to the agar diffusion method. The compounds (P1,P2,C1, and C2) have shown, in general,  significant inhibition against bacterial.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Terrorism and Internal Displacement in Iraq: A Field Study in Baghdad
...Show More Authors

    Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.

    In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Administrative Empowerment and Its Relationship to Remote Supervision at Public Schools
...Show More Authors

The study aims to identify the extent of the availability of administrative empowerment and the implementation of remote supervision in relation to two variables with respect to the employees of the Saudi Ministry of Education. The study included (456) male and female supervisors. The questionnaire has been administrated to collected data related to the research aims. The results indicated that both the extent of the availability of administrative empowerment and the implementation of remote supervision is of an average degree. There is a significant correlation relationship (p<0.05) between administrative empowerment and remote supervision of the educational supervisors of the Saudi Ministry of Education. The research recommends that

... Show More
View Publication Preview PDF