Preferred Language
Articles
/
ohcwdo8BVTCNdQwCFXjW
Spectrophotometric Determination of Nifedipine in Pharmaceutical Tablets Using Batch and Flow Injection Method Via Diazotization Coupling Reaction
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Nov 01 2014
Journal Name
International Journal Of Basic And Applied Sciences
A reliable iterative method for solving the epidemic model and the prey and predator problems
...Show More Authors

In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Creating Through Points in Linear Function with Parabolic Blends Path by Optimization Method
...Show More Authors

The linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Determination of levels of interaction between urban land use and the adoption of spatial analysis techniques (study area, Najaf City)
...Show More Authors

the student of the structure of the city and its constituent elements will clearly sense the invisible relationships that underlie the different forms of urban activity, which in turn are defined by the generality of the urban patterns in that city, which will vary clearly according to the location in the city. These relations will be embodied in their true form in the interactions between the different uses of the earth, and the change that will result from their regularity in the form of entities in independent groups, which may share with each other a component of it.
Therefore, the process of controlling the functional interactions between the uses of the urban land and the awareness of t

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Flow Production Rate of Hard Photons Probes of Quark–Anti Quark Annihilation Processes at Plasma Phase
...Show More Authors

The flow emission rate of hard photons from lowest order the QCD processes for quark-anti quark annihilation processes in plasma media at high temperatures (175, 200, 225, 250 and 275 MeV) have been study. In these framework photons, the flow photons emission is calculate according to quark-antiquark annihilation using the quantum chromodynamic theory and solves the ultrarelativistic equation with MATLAP program. Due to the results, we show increases flow photons rate with increases strength coupling and increases with increases temperature of media, it indicate that logarithmically divergent thermal effect on photons product. The critical temperature (Tc=155 to 195 MeV) effect on the quarks confined in hadronic matter phase, it is importan

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of integration between the earned value management model and the value flow map in rationalizing the costs of construction projects: applied research in Al-Rasheed General Company for Construction Contracting
...Show More Authors

The research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref