Preferred Language
Articles
/
UBbltIcBVTCNdQwCuV1T
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

Crossref
View Publication
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Qarun In the Holy Quran "": An analytical study
...Show More Authors

For in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 26 2024
Journal Name
Journal Of Optics
Cysteine-cupped CdSe/CdS quantum dots as an opticalbiosensor for early skin cancer detection
...Show More Authors

This study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Al-kindy College Medical Journal
Al-Kindy College Medical Journal: An Audit of Publications for One Decade (2015-2024)
...Show More Authors

The Al-Kindy College Medical Journal (KCMJ) is an Iraqi scholarly journal published by the Al-Kindy College of Medicine, University of Baghdad. It was officially founded in 2004. It is a peer-reviewed journal, published in both online and printed forms. It has a mission to offer a publication platform that mirrors recent knowledge and findings in the field of medicine and medical sciences. It publishes various types of articles, including editorial, review article, research article, brief report, case report, and letter to editor. It accepts articles in the English language. It was biannually published till 2021 when it started to launch three issues per year. The journal is registered with numerous partners, including Iraqi Academi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Wed Oct 01 2014
Journal Name
Iosr Journal Of Mathematics
Flow through an Oscillating Rectangular Duct for Generalized Oldroyd-B Fluid with Fractional Derivatives
...Show More Authors

The analytic solution for the unsteady flow of generalized Oldroyd- B fluid on oscillating rectangular duct is studied. In the absence of the frequency of oscillations, we obtain the problem for the flow of generalized Oldroyd- B fluid in a duct of rectangular cross- section moving parallel to its length. The problem is solved by applying the double finite Fourier sine and discrete Laplace transforms. The solutions for the generalized Maxwell fluids and the ordinary Maxwell fluid appear as limiting cases of the solutions obtained here. Finally, the effect of material parameters on the velocity profile spotlighted by means of the graphical illustrations

View Publication
Publication Date
Mon Apr 03 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Integrated Grasshopper Optimization Algorithm with Artificial Neural Network for Trusted Nodes Classification Problem
...Show More Authors

Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Pushing towards ehealth for iraqi hypertensives: an integrated class association rules into SECI model
...Show More Authors

<span lang="EN-GB">This paper highlights the barriers that have led to a delay in the implementation of E-Health services in Iraq. A new framework is proposed to improve the E-Health sector using a SECI model which describes how explicit and tacit knowledge is generated, transferred, and recreated in organizations through main stages (socialization, externalization, combination and internalization). Class association rules (CARs) is integrated to mine the SECI model by extracting related rules which correspond to the medical advice. The proposed framework (SECICAR) can be done through a web portal to assemble healthcare professionals, patients in one environment. SECICAR will be applied to the hypertension community to show th

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref