Preferred Language
Articles
/
qBiYIpgBVTCNdQwC0bkm
A hybrid analytical method for fractional order Klein–Gordon and Burgers equations
...Show More Authors

Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Partial Differential Equations In Applied Mathematics
Determination of time-dependent coefficient in time fractional heat equation
...Show More Authors

View Publication
Scopus (14)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Corporate And Business Strategy Review
The role of entrepreneurial leadership strategy in promoting organizational sustainability: A descriptive and analytical study
...Show More Authors

The paper aims to build a model that supports organizational sustainability by analyzing the correlations and revealing the impact between the two main variables (entrepreneurial leadership) with its dimensions of proactive outlook, risk, and creativity (Van Zyl & Mathur-Helm, 2007), and (organizational sustainability) with its economic, environmental, and societal dimensions (Hansmann et al., 2012). As well as identifying the level of awareness and informing managers in the General Company for the Automotive and Equipment Industry, of the theoretical implications and performance, and its vital importance to society and the surrounding ecological environment, and drawing attention to that and improving performance, and indicatin

... Show More
View Publication
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Thu May 01 1997
Journal Name
Polymer-plastics Technology And Engineering
An Efficient Method for Real Gas Pseudopressure Calculation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Delay differential equation of the 2nd order and it's an oscillation yardstick
...Show More Authors

This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Research
ON STABILITY AND THE BOUNDEDNESS OF THE ZERO SOLUTION OF FIFTH ORDER
...Show More Authors

This paper is illustrates the sufficient conditions of the uniformly asymptotically stable and the bounded of the zero solution of fifth order nonlinear differential equation with a variable delay τ(t)

Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Solving the created ordinary differential equations from Lomax distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed May 19 2010
Journal Name
Journal Of College Of Science, University Of Babylon
H-Point Standard Addition Method for Simultaneous Determination of Cimetidine and Erythromycin Ethylsuccinate Drugs Using Bromothymol Blue as a Chromogenic Complexing Agent
...Show More Authors

The H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 16 2025
Journal Name
Asean Journal Of Science And Engineering
Enhancing Predictive Maintenance in Energy Systems Using a Hybrid Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) Framework for Rotating Machinery
...Show More Authors

This study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref