Preferred Language
Articles
/
bsj-4934
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 11 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Elimination of the broadening in X-ray diffraction lines profile for nanoparticles by using the analysis of diffraction lines method
...Show More Authors

In this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Zeitschrift Für Assyriologie Und Vorderasiatische Archäologie
Literary Texts from the Sippar Library I: Two Babylonian Classics
...Show More Authors
Abstract<p>Publication and edition of two tablets from the library in the Ebabbar Temple of Sippar, a manuscript of the ‘Babylonian Poem of the Righteous Sufferer’ (<italic>Ludlul bēl nēmeqi</italic>) Tablet III, and a manuscript of the long prayer to Marduk ‘Furious Lord’ (also known as ‘Marduk 1’).</p>
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Latin American Journal Of Solids And Structures
Peak Ground Acceleration Models Predictions Utilizing Two Metaheuristic Optimization Techniques
...Show More Authors

View Publication
Crossref (15)
Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Comparison study between two different Environment areas regarding diarrhea causes.
...Show More Authors

This study Achieved to search form the infections by Cholera and Diarrhea in two different areas from the side of Cultural, Social, Economical and Environmental field in Baghdad governorate, during a period from 3/10 – 3/12/2007.these were in Obiady city and Palestine street. This study included groups of patients who went to the Kindy Hospital lab. The researcher use a sample of (300) persons of different ages with range (150) persons in each city from the study city, in this study show a great different in the percentage of infection by parasites, helminthes, viruses, bacteria and vibrio cholera in the two city according to age groups, reach upper percentage by infection in age (1-10) years in Obiady city with percent (57.5 %) wh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
MINIATURE TWO-FINGERED ROBOT HAND DRIVEN BY MUSCLE WIRES ACTUATORS
...Show More Authors

In this research, a modified artificial hand with direct control has been designed using electrical artificial muscle wires that receive direct sensory impulses through human hand instead of using the mechanical action to open and close this artificial hand. Each finger is designed as a chain and its movements achieved through the conventional arrangement control of the electrical muscles wires. The results indicate that it is possible to design an artificial hand using electrical muscle wire for control it with high accuracy.

View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
College Of Islamic Sciences
Two Poets Alandaluian Abu Al Makshi and His Douter Hasana
...Show More Authors

Andalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Inspection In Achieving Banking Compliance: An Applied Study In A Sample o Iraq Banks
...Show More Authors

The Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.

The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.

Has been reached on a set of theoretical and practical conclusions, including: -

1-confirmed the statistical analysis of the answers to the research sample the importance of the role o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles to the application of total quality management program in a number of iraqi service organizations
...Show More Authors

The research aims to statement the main obstacles that prevent the application of total quality management (TQM) in a number of Iraqi service organizations, and by one organization in each of the sectors (health, finance, education, higher education, tourism), which are, (Al-Yarmouk Teaching Hospital, Rafidain Bank/ Branch of Hay Al-Arabi Al-Jadid, Al-Karkh/1 Directorate of Education, College of administration and Economics/ Baghdad University, International Palestine Hotel). The research also, tries to classify the priority of the obstacles depending on the type of service organization surveyed. And diagnoses the extent to which or the difference of the research sample members views on the order of obstacles of TQM, and also proposes a

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref