Preferred Language
Articles
/
WxbztIcBVTCNdQwCCl2W
A reliable iterative method for solving the epidemic model and the prey and predator problems
...Show More Authors

In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier as in Variational Iteration Method (VIM) and no needs to construct a homotopy as in Homotopy Perturbation Method (HPM). The results obtained are compared with the results by existing methods and prove that the presented method is very effective, simple and does not require any restrictive assumptions for nonlinear terms. The software used for the numerical calculations in this study was MATHEMATICA r 8.0.

Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
COMPARATIVE STUDY BETWEEN A NOVEL DETERMINISTIC TEST FOR MERSENNE PRIMES AND THE WELL-KNOWN PRIMALITY TESTS
...Show More Authors

In this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Assessing the Potentiality of Using CXCL9 as A Predictive Biomarker for Acute and Chronic Toxoplasmosis, and Study the Correlation Between CXCL9, Toxoplasmosis and Thyroid Disorder in These Cases
...Show More Authors

     Background:  Chemokine (C-X-C motif) ligand (CXCL9) has an important role recruiting the T-lymphocytes and immune response after infection by inducing T-cells accumulation around the areas associated with infections. However, this role is poorly known in relation with Toxoplasma gondii infection and also in association with thyroid hormones, which the present study is focused on. Methods: Eighty-seven women were included in this study for the period between September 2021 and February 2022. Blood samples of uninfected healthy pregnant, in addition to aborted and pregnant women infected with toxoplasmosis, were collected. Sera were then obtained and stored at -10°C. Toxo-latex agglutination test was done, followed by detec

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 03 2025
Journal Name
Internationaljournalof Economicsandfinancestudies
CROSS-SECTIONAL REGRESSION WITH PROXIES: A SEMI-PARAMETRIC METHOD
...Show More Authors

This study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K

... Show More
View Publication
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
THE METHOD OF EXPRESSION IN INNATE AND POPULAR IRAQI SCULPTURAL CONTEMPORARY STUDYING BETWEEN (Hadi KadhimNassif) and (Ibrahim al nakash): كفاح عبد المجيد
...Show More Authors

The innate art,is a major tributary in the art world, It is a bold achievement, has a special flavor, With self-identity, linked to the origins and roots of human ,That goes back to the past and the history and culture of peoples. This business is not limited to only aesthetic side, but is loaded with religious and magical experience, and have social functions, This creations stayed live, breathe, grow, and change with the transformation of society, these processors emerged, from local people have not been trained academically.Their Elvis came from community culture,Which are, Mesopotamian thoroughbreds.This culture that we desperately need today, in order to increase ourselves Iraqi force, In the face of the modern world, which is locke

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
On semi strongly (E, F)-convex functions and semi strongly (E, F)-convex optimization problems
...Show More Authors
Abstract<p>In this paper, a new class of non-convex functions called semi strongly (<italic>E, F</italic>)-convex functions are presented. This class represents a natural extension of semi strongly <italic>E</italic>-convex functions shown in the literature. Different properties of this class of functions are discussed. Optimality properties of constrained optimization problems in which the objective function or the inequality constraints functions are semi strongly (<italic>E, F</italic>)-convex are proved for this class.</p>
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Contemporary accounting thought problems and its Roles in creation Global financial crises: An analytical study
...Show More Authors

  With occurrence of any financial crises, regardless at global or regional levels such as the great economic crises during 1929 – 1933 and the Asian financial crises at the end of twentieth century as well as the current global financial crises that started during second half 2008, we acknowledge that there are some critics loudly articulated accusing accountants and auditors for disparences, and they are numerical partner of financial manipulation as well as corrupted administrators with the company's administrators that they are difficulty. At this point, many suggestions and recommendation for upgrading the accounting system has been made.              &nbsp

... Show More
View Publication Preview PDF