Preferred Language
Articles
/
ahbp-YoBVTCNdQwCSsYf
Modification of FAU zeolite as an active heterogeneous catalyst for biodiesel production and theoretical considerations for kinetic modeling
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Nov 01 2014
Journal Name
International Journal Of Basic And Applied Sciences
A reliable iterative method for solving the epidemic model and the prey and predator problems
...Show More Authors

In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Journal Of Planner And Development
Environmental dimensions and administrative mechanisms for the territory planning in Algeria, between theory and reality.
...Show More Authors

     In front of the serious deterioration of the elements of the environment, new convictions arose the need to integrate into the global environmental concerns as being one and the issue of shared responsibility and the impact of this conviction, the evolution of the environment protection law in many countries, including Algeria. Due to the multiplicity of perceptions about the environmental result of multiple scientific disciplines, the legislative concept emerged to protect the environment, which includes prevention and rational management and conservation and restoration and repair.

    Environmental planning for the various governments and countries aims to avert disasters and achieve the

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 14 2024
Journal Name
2024 11th International Conference On Reliability, Infocom Technologies And Optimization (trends And Future Directions) (icrito)
Beyond Containers: Orchestrating Microservices with Minikube, Kubernetes, Docker, and Compose for Seamless Deployment and Scalability
...Show More Authors

View Publication
Scopus (15)
Crossref (9)
Scopus Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Serum and Salivary Adipokines (Leptin and Resistin) Levels in Periodontal Health and Disease
...Show More Authors

Background: With the start of the current century, increased the interest in the role of the adipose tissue derived substances that named adipokines in the inflammatory diseases of the human being including the inflammatory periodontal disease, but scientific evidences were not clearly demonstrate the association between these adipokines and periodontal pathologies. Materials and Methods: Forty two subjects male only with normal body mass index were selected for the study with an age ranged (30-39 years). Samples were divided into three groups of 14 subjects in each group based on clinical periodontal parameters; clinically healthy gingiva (group I), gingivitis group (group II) and chronic periodontitis patients group (group III), from whom

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Investigating the use of lean manufacturing techniques in liquid batteries production: A field research in Babylon plants
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the group 𝓢𝓛(2,38)
...Show More Authors

Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Cutaneous leishmaniasis: Comparative Techniques for Diagnosis
...Show More Authors

AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14

View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref