Preferred Language
Articles
/
cBcIFo8BVTCNdQwChFt0
Efficient Modifications of the Adomian Decomposition Method for Thirteenth Order Ordinary Differential Equations
...Show More Authors

This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.

View Publication
Publication Date
Wed May 13 2026
Journal Name
Misan Journal Of Academic Studies
Some of Parametric and Non Parametric Estimations for Circular Regression Model via Simulation
...Show More Authors

Circular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Image And Video Technology: 8th Pacific-rim Symposium
A New Scheme for QoE Management of Live Video Streaming in Cloud Environment
...Show More Authors

Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Science
Study of Corrosion Inhibition for Some New Schiff Bases Synthesized from Quinazolinone Derivative
...Show More Authors

In this work, new Schiff bases of quinazolinone derivatives (Q1-Q5) were synthesized from methyl anthranilate. The synthesis involved three steps. In the first step, methyl anthranilate was reacted with isothiocyanatobenzene, producing the thiourea derivative K1. The second step entailed reacting K1 with hydrazine hydrate, synthesizing 3-amino-2-(phenylamino) quinazolin-4(3H)-one (K2). The third step involved reaction of K2 with various aromatic aldehydes, yielding the Schiff bases derivatives Q1-Q5. The chemical structures of these compounds were identified by FT-IR,1H NMR and 13C NMR spectroscopy. The newly synthesized derivatives (Q1-Q5) were subjected to rigorous evaluation to assess their efficacy as corrosion inhibitors for ca

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Batch and flow injection spectrophotometric methods for determination of Ceftazidime in pharmaceutical formulations
...Show More Authors

It is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations.  The methods  are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown  and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from  (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Dec 12 2013
Journal Name
Iraqi Journal Of Science
Determination of Optimum Mechanical Drilling Parameters for an Iraqi Field with Regression Model
...Show More Authors

Preview PDF
Publication Date
Tue Jun 18 2024
Journal Name
2023 Asee Annual Conference & Exposition Proceedings
Study of Artificial Intelligence Computing Devices for Undergraduate Computer Science and Engineering Labs
...Show More Authors

View Publication
Crossref
Publication Date
Thu Mar 22 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Assessment of medical solid waste generation rates for teaching hospitals in Baghdad city
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect

... Show More
Publication Date
Wed Mar 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Corrosion Inhibition for Carbon Steel of Benzimidazole Derivatives Synthesized in Sulfuric Acid Solution
...Show More Authors

Synthesis three organic inhibitors for carbon steel corrosion: 2-(propylthio)-1H-benzo[d]imidazole (PTBI), 2-(allylthio)- 1H-benzo[d]imidazole (ATBI) and 2-(prop-2-ynylthio)-1H-benzo[d]imidazole (YTBI) were prepared from reaction of 2-mercapto benzimidazole with different alkyl halide. The melting point and TLC were used to confirm the purity of the inhibitors as well as using the [FTIR, 1H-NMR and 13C-NMR] for the identify structures. The synthesized inhibitors were examined by potentiostatic polarization measurement as corrosion inhibitors of carbon steel in acidic media [1M H2SO4 ].The polarization measurement results showed that the mixed type inhibitors. In addition, the efficiency of inhibitors (YTBI) were studied at different con

... Show More
View Publication Preview PDF