Preferred Language
Articles
/
bsj-852
Heun Method Using to Solve System of NonLinear Functional Differential Equations
...Show More Authors

In this paper Heun method has been used to find numerical solution for first order nonlinear functional differential equation. Moreover, this method has been modified in order to treat system of nonlinear functional differential equations .two numerical examples are given for conciliated the results of this method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Diagnostically study of the Digestive system Helminthes
...Show More Authors

A total of 247 specimens of the Mallard were collected from Baghdad city and kut City and 154 specimens the collection was started from October1999

View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Al-kindy College Medical Journal
Automation of the Healthcare System in Iraq
...Show More Authors

In the last few years, following the relative stability of the political, economic, and security environments, Iraq has embarked on a transformation towards an ambitious program of automation across various sectors. However, this automation program faces numerous challenges, including significant investments in technology and training, addressing social impacts, and combating widespread illiteracy

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 30 2018
Journal Name
Proceedings Of The International Conference On Intelligent Science And Technology
The nature of intelligent system in buildings
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 20 2025
Journal Name
Journal Of The Iraqi University
The legal system of Administrative BOT Contracts
...Show More Authors

View Publication
Publication Date
Sun Dec 12 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
The Development of the US Federal System
...Show More Authors

Geographical, economic, historical, environmental and security factors play a role in strengthening the drive towards union, as well as addressing the need to express regional and federal identity. This is a clear example of this tendency. One legal or one political system with the parts of this united personality retaining their privacy and identity, and there is a delegation to the central entity of the union with some of the common powers while retaining some powers for these parts or states, which means the availability of autonomy for the constituent states of the union and this is the most important characteristic of the federal states or federations It is the autonomy of each state or country participating in the union. Accordingly,

... Show More
Preview PDF
Publication Date
Mon Jul 25 2016
Journal Name
Earthquakes And Structures
Vibration response of saturated sand - foundation system
...Show More Authors

In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load applied on a footing resting on sandy soil at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into consideration include loading frequency, size of footing and different soil conditions. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used. The footings were tested by changing all parameters at the surface and at 50 mm depth below model surface. Meanwhile, the investigated paramete

... Show More
View Publication
Publication Date
Thu Nov 20 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Flattening of the posterior slope of the articular eminence of completely edentulous patients compared to patients with maintained occlusion in relation to age using computed tomography
...Show More Authors

Background: The posterior slope of the articular eminence of completely edentulous patients compared to patients with maintained occlusion shows significant flattening. This study aimed to correlate between the flattening of the posterior slope of the articular eminence, with dental status, age, genders, on both sides using computed tomography. Materials and Methods: The sample of the present study was a total of 117 Iraqi subjects, who admitted to the maxillofacial department at Al-Sadr Teaching Hospital in Al-Najaf city. The examination was performed on CT scanner; the eminence inclination was measured in two methods using sagittal section. Results: Clinically, the inclination of articular eminence was higher in edentulous subjects than i

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (53)
Crossref (12)
Scopus Crossref
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More