Preferred Language
Articles
/
PRjaYJQBVTCNdQwC_BTK
Certain subclass of meromorphic univalent positive coefficients defined by q-difference operator
...Show More Authors

This paper introduces a Certain Subclass of Meromorphic Univalent Positives Coefficients Defined by the q-Difference Operator. Coefficient estimates are investigated and obtained, and the upped bound is calculated.

Clarivate Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Existence of Positive Solution for Boundary Value Problems
...Show More Authors

  This paper studies the existence of  positive solutions for the following boundary value problem :-
 
 y(b) 0 α y(a) - β y(a) 0     bta             f(y) g(t) λy    
 
 
The solution procedure follows using the Fixed point theorem and obtains that this problem has at least one positive solution .Also,it determines (  ) Eigenvalue which would be needed to find the positive solution .

View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Realization of positive politeness strategies in language
...Show More Authors

0

View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
CERTAIN FAMILY OF MULTIVALENT FUNCTIONS ASSOCIATED WITH SUBORDINATION
...Show More Authors
Abstract<p>We have studied new subclass B (A, B,γ) over multivalent functions. We have present some effects because of the category B (A, B,γ). We bear mentioned simple properties, convolution properties, incomplete sums, weighted mean, arithmetic mean, linear combination, inclusion rapport and neighborhood properties, software concerning fractional calculus then vile residences because of both the classes…</p>
View Publication
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Certain Family of Multivalent Functions Associated With Subordination
...Show More Authors

The main objectives of this pepper are to introduce new classes. We have attempted to obtain coefficient estimates, radius of convexity, Distortion and  Growth theorem and other related results for the classes

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
Some Properties of D-Operator on Hilbert Space
...Show More Authors

In this paper, we introduce a new type of Drazin invertible operator on Hilbert spaces, which is called D-operator. Then, some properties of the class of D-operators are studied. We prove that the D-operator preserves the scalar product, the unitary equivalent property, the product and sum of two D-operators are not D-operator in general but the direct product and tenser product is also D-operator.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
On q-SZASZ- Mirakyan Operators of functions of Two Variables
...Show More Authors

In this paper, we define two operators of summation and summation-integral of q-type in two dimensional spaces. Firstly, we study the convergence of these operators and then we prove Voronovskaya- type asymptotic formulas for these operators.

View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Engineering Analysis With Boundary Elements
Numerical solution of two-dimensional mixed problems with variable coefficients by the boundary-domain integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Molding and simulation sedimentation process using finite difference method
...Show More Authors
Abstract<p>The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed</p> ... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref