Preferred Language
Articles
/
jcoeduw-448
Solution of the electromechanical machining problem using the collocation method based on Bernstein polynomials
...Show More Authors

0

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analyzing the net profitability of total investments using a constructed mathematical model: An applied research at Iraqi Middle East Bank for investment for the financial years 2008-2010
...Show More Authors

The trading banks in Iraq invest their funds according to regulations imposed by the Central Bank in Iraq in different financial fields like stock exchanges, acquire stocks as assets that could be sold at any time as well as make loans and contributing in corporations establishment also magnitude foreign capital through direct contacts with foreign exchange markets.

We can summarize the problem of this paper as shortage in mathematical models that used in studying and analyzing these investments and according to this problem we used (a constructed mathematical model ) consists of three major indicators: profitability of total investment assets which is divided into three sub-indicators: owners equity risk indicator, debits risk i

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Impact of using the strategy of shape (V) on the Achievement of the students of the Department of Artistic Education: كريم حواس علي، نجلاء خضير حسان
...Show More Authors

This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 03 2007
Journal Name
Um-salama Science Journal
A study of adsorption in aqueous solution of p,o,m-Chlorophenol on Iraqi siliceouns rocks powder
...Show More Authors

Adsorption of Chlorophenol compounds in aqueous solution on Iraqi siliceouns rocks powder have been investigated. UV technique has been used to determine the adsorption isotherms. The results showed that the adsorption isotherms obeyed Freundlich adsorption equation. The adsorption was endothermic process, increasing temperature leads to increasing adsorption.  H,  S,  G were calculated. The results showed that the adsorption increases with increasing acidity of solutions

Publication Date
Sun Jul 01 2012
Journal Name
International Journal Of Computer Mathematics
Numerical solution of the two-dimensional Helmholtz equation with variable coefficients by the radial integration boundary integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Effectiveness of Counseling on Using the Technique of ‎Positive Self-talk to Develop the Habits of Mind Among Secondary ‎School Students
...Show More Authors

This research aims to identify the effectiveness of counseling by using the technique of self-talkin developing the habits of mind among middle school students by testing important hypotheses, and choosing the experimental design for the two groups (experimental - control). The classification of "Costa & Kallick" was adopted to measure the habits of the mind, and the scale consisted of (64) items, and after confirming the psychometric properties of the scale, the researcher applied it to the research sample (487) students from middle school students. One of the students who got the lowest marks after answering the scale. purpose of applying the experiment. He divided them into two groups, one of them is experimental (10) students, as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 11 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More