This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, transitive, tolerance, dominance and equivalence in table.
This research paper is about thevariationin the degree of Continentality climate of the
Iraq during (40) years for a number of climate station. Using Poresof formula, it is found out
that the climate of Iraq ranges between extreme Continentality and very extreme
Continentality, and that the Continentality degree is characterized with extreme frequency
from one year to another. In certain years, the degree of climate Continentality decreases
while in other years it rises in such a way that there is no similarity in the Continental degree
from one year to another for the same station.
As for the general trend of the degree of Continentality, the last years had noticed
special variations, which are divided in to thre
In this present paper, we obtain some differential subordination and superordination results, by using generalized operators for certain subclass of analytic functions in the open unit disk. Also, we derive some sandwich results.
The study aimed to identify the awareness degree of teacher students in the department of Arabic language and their supervisors at Al-aqsa University for their future roles in the age of knowledge. To achieve this objective, descriptive- analytical approach was used. The instruments of this study were two questionnaires: first one consist of (20) item for teacher students, and the second consist of (27) item for educational supervisors which covered three roles: professional, technological, and humanitarian. The sample was (120) student selected randomly, and (39) supervisors of Arabic language. The result revealed that the mean of degree awareness of teacher students and their supervisors of future role are (3.857), (3.472) respectively
... Show MoreThis study aimed to identify the degree of use computers in administrative functions (planning, organization, controlling, and evaluation) among school leaders and assistants in public education schools in Sharoorah governorate ، as well as to identify obstacles of use computers in administrative functions from the perspective of school leaders and assistants male and female in public schools during the academic year 1439-1440, the study sample (66) school leaders and assistants, males (58), a and females (44), , and to answer the questions of the study, the researchers developed a questionnaire consisting of (60) items, has been verified sincerity and persistence, and data analysis was used frequencies, percentages an
... Show MoreThis study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.
Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).
Auto
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreSome modified techniques are used in this article in order to have approximate solutions for systems of Volterra integro-differential equations. The suggested techniques are the so called Laplace-Adomian decomposition method and Laplace iterative method. The proposed methods are robust and accurate as can be seen from the given illustrative examples and from the comparison that are made with the exact solution.
In this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThis work is concerned with the vibration attenuation of a smart beam interacting with fluid using proportional-derivative PD control and adaptive approximation compensator AAC. The role of the AAC is to improve the PD performance by compensating for unmodelled dynamics using the concept of function approximation technique FAT. The key idea is to represent the unknown parameters using the weighting coefficient and basis function matrices/vectors. The weighting coefficient vector is updated using Lyapunov theory. This controller is applied to a flexible beam provided with surface bonded piezo-patches while the vibrating beam system is submerged in a fluid. Two main effects are considered: 1) axial stretching of the vibrating beam that leads
... Show MoreThis paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closedloop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadin
... Show More