Preferred Language
Articles
/
0hb5zIcBVTCNdQwCvWFb
Reliable Iterative Methods for Solving Convective Straight and Radial Fins with Temperature-Dependent Thermal Conductivity Problems
...Show More Authors

In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the proposed methods are efficient and reliable. Our computational works have been done by using the computer algebra system MATHEMATICA®10 to evaluate the terms in the iterative processes.

Crossref
View Publication
Publication Date
Thu Oct 26 2017
Journal Name
International Journal Of Pure And Applied Mathematics
ON CONVEX FUNCTIONS, $E$-CONVEX FUNCTIONS AND THEIR GENERALIZATIONS: APPLICATIONS TO NON-LINEAR OPTIMIZATION PROBLEMS
...Show More Authors

Contents IJPAM: Volume 116, No. 3 (2017)

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Simulation and investigation of the ICP plasma torch’s electrical and thermal properties
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Journal Of Inorganic And Organometallic Polymers And Materials
Improving the Mechanical Properties, Roughness, Thermal Stability, and Contact Angle of the Acrylic Polymer by Graphene and Carbon Fiber Doping for Waterproof Coatings
...Show More Authors

View Publication
Crossref (13)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Complaint's Terms and Methods in Statement of Holy Quran
...Show More Authors

This research deals with a unique and innovative topic, that is the study of complaint in the Quranic text. Despite its importance, it has never been studied before, because most of the complaint 's meanings in the Quranic text is: the in explicit complaint. The mentioned complaint's expressions in different contexts overlap with other purposes, in particular call method and its peripherals like mourn , ask for help , exclamation and others.
Moreover, expressions that reveal complaint are related to the complainant's emotional and psychological status, and the complaint's context.
This research deals with the topic into two sections: The first deals with the important expression of complaint such as: iff, ouah, mooing, crying. The

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF