<p>Daftardar Gejji and Hossein Jafari have proposed a new iterative method for solving many of the linear and nonlinear equations namely (DJM). This method proved already the effectiveness in solved many of the ordinary differential equations, partial differential equations and integral equations. The main aim from this paper is to propose the Daftardar-Jafari method (DJM) to solve the Duffing equations and to find the exact solution and numerical solutions. The proposed (DJM) is very effective and reliable, and the solution is obtained in the series form with easily computed components. The software used for the calculations in this study was MATHEMATICA<sup>®</sup> 9.0.</p>
This research attempts to dust briefly the concept of deliberativeness in Arabic rhetoric, which was only understood in light of modern Western linguistics, starting with its definition (conformity of speech to the necessity of the case with its eloquence) which contains the elements of the entire creative process as shown by this brief study, in the first chapter that He was labeled (deliberative in Western and Arab thought), and we had started it with deliberation in western thought in the first topic in an attempt to highlight the western concepts of this term so that we could discern its originality in the Arab rhetorical heritage that came next in the second topic (deliberative in Arab thought), explaining the appropriate Th
... Show MoreIn the petroleum industry, multiphase flow dynamics within the tubing string have gained significant attention due to associated challenges. Accurately predicting pressure drops and wellbore pressures is crucial for the effective modeling of vertical lift performance (VLP). This study focuses on predicting the multiphase flow behavior in four wells located in the Faihaa oil field in southern Iraq, utilizing PIPESIM software. The process of selecting the most appropriate multiphase correlation was performed by utilizing production test data to construct a comprehensive survey data catalog. Subsequently, the results were compared with the correlations available within the PIPESIM software. The outcomes reveal that the Hagedorn and Brown (H
... Show MoreAbstract
The Non - Homogeneous Poisson process is considered as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).
This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto , to estimate th
... Show MoreThe current study focuses on utilizing artificial intelligence (AI) techniques to identify the optimal locations of production wells and types for achieving the production company’s primary objective, which is to increase oil production from the Sa’di carbonate reservoir of the Halfaya oil field in southeast Iraq, with the determination of the optimal scenario of various designs for production wells, which include vertical, horizontal, multi-horizontal, and fishbone lateral wells, for all reservoir production layers. Artificial neural network tool was used to identify the optimal locations for obtaining the highest production from the reservoir layers and the optimal well type. Fo
Receive money laundering phenomenon of interest to researchers and scholars on different intellectual orientation of economic or political or other, as this process is gaining paramount importance in light of business and increase the number of banks in the province of Kurdistan of Iraq and Erbil in particular and in the presence of openness developments chaotic economic and there are no factors encourage money laundering operation because of the presence of the hidden economy and the weakness of the banking and legal measures to combat them, and on this basis there is a need to examine money laundering operation in the province of Arbil, to indicate the presence or absence of a money laundering operation in working in the provin
... Show More(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show Morenatural and non-natural disasters, is an environmental challenges the society and the economy as well as a direct and indirect economic affect, and the units are part of the system overlapping among themselves and thus affected by external indicators, directly or indirectly, these direct effects appear in the destruction or damage inflicted by disasters in property , infrastructure , superstructure , accounting information systems and indirectly in the outcome of future business, comes research problem through access to accounting treatments issued by the Federal Office of financial supervision to address the damage caused by the disasters and prepare the missing financial accounts it turns out us that there is negligence of a nu
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More