Preferred Language
Articles
/
mhhLFpcBVTCNdQwClJVS
A New Class of Higher Derivatives for Harmonic Univalent Functions Established using a Generalized Fractional Integral Operator
...Show More Authors

A new class of higher derivatives  for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.

Crossref
View Publication
Publication Date
Mon Feb 01 2021
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
Generalized Rough Digraphs and Related Topologies1
...Show More Authors

In this thesis, we introduce eight types of topologies on a finite digraphs and state the implication between these topologies. Also we studied some pawlak's concepts and generalization rough set theory, we introduce a new types for approximation rough digraphs depending on supra open digraphs. In addition, we present two various standpoints to define generalized membership relations, and state the implication between it, to classify the digraphs and help for measure exactness and roughness of digraphs. On the other hand, we define several kinds of fuzzy digraphs. We also introduce a topological space, which is induced by reflexive graph and tolerance graphs, such that the graph may be infinite. Furthermore, we offered some properties of th

... Show More
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
A Comparison of the Methods for Estimation of Reliability Function for Burr-XII Distribution by Using Simulation.
...Show More Authors

This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 02 1999
Journal Name
Iraqi Journal Of Science
A new proposal method for sampling and explosion of the phosphatic rocks in the Akkashat Mine, Western desert, Iraq
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Numerical Investigation of Physical Parameters in Cardiac Vessels as a New Medical Support Science for Complex Blood Flow Characteristics
...Show More Authors

This study proposes a mathematical approach and numerical experiment for a simple solution of cardiac blood flow to the heart's blood vessels. A mathematical model of human blood flow through arterial branches was studied and calculated using the Navier-Stokes partial differential equation with finite element analysis (FEA) approach. Furthermore, FEA is applied to the steady flow of two-dimensional viscous liquids through different geometries. The validity of the computational method is determined by comparing numerical experiments with the results of the analysis of different functions. Numerical analysis showed that the highest blood flow velocity of 1.22 cm/s occurred in the center of the vessel which tends to be laminar and is influe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A study of the effect of new cobalt (II) complex and cyclophosphamide drug on (GPT, ALP) activity by using in vivo system
...Show More Authors

The present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Proposing a General Formula for Evaluating the Parametric Cost Using MLR Method
...Show More Authors

This research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2025
Journal Name
Ieee Access
Optic Flow Estimation for Human Spine Movements Using a Motion Capture System
...Show More Authors

Human interaction technology based on motion capture (MoCap) systems is a vital tool for human kinematics analysis, with applications in clinical settings, animations, and video games. We introduce a new method for analyzing and estimating dorsal spine movement using a MoCap system. The captured data by the MoCap system are processed and analyzed to estimate the motion kinematics of three primary regions; the shoulders, spine, and hips. This work contributes a non-invasive and anatomically guided framework that enables region-specific analysis of spinal motion which could be used as a clinical alternative to invasive measurement techniques. The hierarchy of our model consists of five main levels; motion capture system settings, marker data

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (6)
Scopus
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref