Preferred Language
Articles
/
bsj-7543
Newton-Kantorovich Method for Solving One of the Non-Linear Sturm-Liouville Problems
...Show More Authors

Due to its importance in physics and applied mathematics, the non-linear Sturm-Liouville problems
witnessed massive attention since 1960. A powerful Mathematical technique called the Newton-Kantorovich
method is applied in this work to one of the non-linear Sturm-Liouville problems. To the best of the authors’
knowledge, this technique of Newton-Kantorovich has never been applied before to solve the non-linear
Sturm-Liouville problems under consideration. Accordingly, the purpose of this work is to show that this
important specific kind of non-linear Sturm-Liouville differential equations problems can be solved by
applying the well-known Newton-Kantorovich method. Also, to show the efficiency of applying this method
to solve these problems, a comparison is made in this paper between the Newton-Kantorovich method and the
Adomian decomposition method applied to the same non-linear Sturm-Liouville problems under consideration
in this work. As a result of this comparison, the results of the Newton-Kantorovich method agreed with the
results obtained by applying Adomian’s decomposition method.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
اعتماد طريقة جمع المصالح ضرورة لتطوير الجانب المنطقي لمعيار الإبلاغ المالي الدولي رقم 3 (اندماج الأعمال)
...Show More Authors

اندماجات الأعمال من المظاهر الطبيعية في غالبية دول العالم، ورغم المنافع الكثيرة لاندماجات الأعمال إلا أن المخاطر التي تنتج منها أدت إلى تعقد الإجراءات القانونية لتنفيذها بشكل كبير، كما تعد المعالجة المحاسبية للاندماج من القضايا المعقدة جداً وتثير جدلاً واسعاً في الفكر المحاسبي لا سيما في ظل وجود مدخلين يؤثران في متضمنات المعالجة المحاسبية للاندماج أولهما المدخل القانوني الذي يقسم الاندماج إلى ثلاثة أشك

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2006
Journal Name
أثر استعمال طريقة التعلم التعاوني في تحصيل طلاب الصف الخامس الأدبي في مادة قــواعــد اللغــة العربيـــة
أثر استعمال طريقة التعلم التعاوني في تحصيل طلاب الصف الخامس الأدبي في مادة قــواعــد اللغــة العربيـــة
...Show More Authors

Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Apr 02 2025
Journal Name
Retos
Varied-method training and its effect on developing some functional physical abilities of youth basketball players
...Show More Authors

Objective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Identification of Candida species Isolated From Vulvovaginal Candidiasis Patients by Chromgen agar and PCR-RFLP Method
...Show More Authors

This study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 02 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of nano surface modification on CPTi dental implant using chemical method: mechanical and histological evaluation
...Show More Authors

Background The application of nanotechnology to biomedical surfaces is explained by the ability of cells to interact with nanometric features. The aim of this study was to consider the role of nanoscale topographic modification of CPTi dental implant using chemical etching method for the purpose of improving osseointegration. Materials and methods: Commercial pure titanium rod was machined into 20 dental implants. Each implant was machined in diameter about 3mm, length of 8mm (5mm was threaded part and 3mm was flat part). Implants were prepared and divided into 2 groups according to the types of surface modification method used: 1st group (10 implant) remained without nano surface modification (control), 2nd group include (10 implant) etche

... Show More
View Publication Preview PDF