The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner, Taylor manner and block- by- block(2, 3, 5).
The performance of composite prestressed concrete beam topped with reinforced concrete flange structures in fire depends upon several factors, including the change in properties of the two different materials due to fire exposure and temperature distribution within the composition of the composite members of the structure. The present experimental work included casting of 12 identical simply supported prestressed concrete beams grouped into 3 categories, depending on the strength of the top reinforced concrete deck slab (20, 30, and 40 MPa). They were connected together by using shear connector reinforcements. To simulate the real practical fire disasters, 3 composite prestressed concrete beams from each group were exposed to high t
... Show MoreThin-walled members are increasingly used in structural applications, especially in light structures like in constructions and aircraft structures because of their high strength-to-weight ratio. Perforations are often made on these structures for reducing weight and to facilitate the services and maintenance works like in aircraft wing ribs. This type of structures suffers from buckling phenomena due to its dimensions, and this suffering increases with the presence of holes in it. This study investigated experimentally and numerically the buckling behavior of aluminum alloy 6061-O thin-walled lipped channel beam with specific holes subjected to compression load. A nonlinear finite elements analysis was used to obtain the
... Show MoreIn general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreIn this research we study one of the pollutants(Gelbstoff ) such as Humic and Fulvic Acids in tap waters by using the technique of Raman, Flora to some regions of Baghdad , the results appear that the tap waters were pollutants which know yellow substance or Gelbstoff instant of suspending waters, which appear through the scattering of the incident light to same the wave length of Raman ,also calculate Raman shift which was 3640 cm-1 and force constant to band (O – H ) was 743 N/m, where the peak of Raman was at the wave length 441 nm after used the excitation wave length 380 nm . The results were in an agreement with lectures [8][9][10].
The health care industry is witnessing an increasing trend in the use of generic medicines because of their presumed low cost compared with innovator medicines. The aim of this study was to determine and compare the performance of the copy drug Osveral®and its innovator drug deferasirox (Exjade®).
A prospective observational study including 223 patients receiving the branded medicine Exjade®and 101 patients receiving the copy Osveral®was carried out. Data were assessed for a 1-year period and included clinical symptoms, serum ferrit
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIt has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE
... Show More