Preferred Language
Articles
/
xhZeZ4cBVTCNdQwCdElH
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
tv series with multiple parts from the viewers viewpoint: عبد الكريم حسين عباس السوداني
...Show More Authors

TV drama has gone through many developmental stages until it reached and settled in the form of TV series of thirty episodes. Alongside the development of the TV technologies and the widespread of satellite channels, the form of the TV drama has changed and the series has consisted of two parts and then parts multiplied until they amounted to ten parts and more. This form of TV drama has become an artistic phenomenon, that once the series is displayed on one of the channels and achieves a noticeable success, its producers work to produce a second part of that series and so on. This form of TV drama has remained away from being researched.
This has urged the researcher to accomplish this study entitled (TV series of multiple parts fro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Chaos, Solitons & Fractals
A semi-analytical iterative method for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (20)
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Laminar Free Convection in Three Dimensional Inclined Porous Annulus with Fins on the Inner Cylinder
...Show More Authors

An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Linear attenuation coefficient measurement in polymer composite
...Show More Authors

Linear attenuation coefficient of polymer composite for beta particles and bremsstrahlung ray were investigated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy range from 0.1-1.1 MeV. The present results show the capability of this composite to absorber beta particles and bremsstrahlung ray that yield from it. That’s mean it is useful to choice this composite for radiation shielding of beta ray with low thickness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 03 2021
Journal Name
Medicine, Conflict And Survival
Domestic violence in time of unrest, a sample from Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref