Preferred Language
Articles
/
dRcIWJIBVTCNdQwCwaxd
Nondestructive Evaluation of Coatings Delamination Using Microwave Time Domain Reflectometry Technique
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu May 21 2026
Journal Name
Journal Of Physical Education
The effect of special exercises using a designer device and added relative weights to develop some of the physical abilities of volleyball players
...Show More Authors

View Publication
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Using the Information Technology on The Audit Profession: A Study of the Sample of Auditor Viewpoints in Selected Arab Countries
...Show More Authors

This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in  developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in  Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Modern Sport
The Effect of Using Competitive Challenge Games in Improving the Performance of Some Complex Offensive Skills at the Ages of (10–12) Years
...Show More Authors

One of the contemporary trends in education and training is the use of educational, competitive and digital games, because one of the most important goals of games is (motivation and challenge). Thus, it ensures the expected reaction from the recipient’s interaction with the game, so we seek his interaction with the content he receives. It is no secret that games distance him from boring content and introduce him to the world of motivation by integrating them with magical elements that make an attractive and desirable game. Naturally, in the case of stimuli and motives that activate the recipient within the context of the educational process procedures, the return is high and especially enjoyable. The aim of the research is to pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using Iterative Reweighting Algorithm and Genetic Algorithm to Calculate The Estimation of The Parameters Of The Maximum Likelihood of The Skew Normal Distribution
...Show More Authors

Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Biodiesel production from used vegetable oil (sunflower cooking oil) using eggshell as bio catalyst
...Show More Authors

Bio-diesel is an attractive fuel fordiesel engines. The feedstock for bio-diesel production is usually vegetable oil, waste cooking oil, or animal fats. This work provides an overview concerning bio-diesel production. Also, this work focuses on the commercial production of biodiesel. The objective is to study the influence of these parameters on the yield of produced. The biodiesel production affecting by many parameters such s alcohol ratio (5%, 10%,15 %, 20%,25%,30%35% vol.), catalyst loading (5,10,15,20,25) g,temperature (45,50,55,60,65,70,75)°C,reaction time (0-6) h, mixing rate (400-1000) rpm. the maximum bio-diesel production yield (95%) was obtained using 20% methanol ratio and 15g biocatalyst at 60°C.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Digital Signal Processing
Reverberant signal separation using optimized complex sparse nonnegative tensor deconvolution on spectral covariance matrix
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Petroleum Science And Technology
Building 3D geological model using non-uniform gridding for Mishrif reservoir in Garraf oilfield
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref