In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i
... Show MoreThirty local fungal isolates according to Aspergillus niger were screened for Inulinase production on synthetic solid medium depending on inulin hydrolysis appear as clear zone around fungal colony. Semi-quantitative screening was performed to select the most efficient isolate for inulinase production. the most efficient isolate was AN20. The optimum condition for enzyme production from A. niger isolate was determined by busing a medium composed of sugar cane moisten with corn steep liquor 5;5 (v/w) at initial pH 5.0 for 96 hours at 30 0C . Enzyme productivity was tested for each of the yeast Kluyveromyces marxianus, the fungus A. niger AN20 and for a mixed culture of A. niger and K. marxianus. The productivity of A. niger gave the highest
... Show MoreZigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh
... Show MoreThis research dealt with desalting of East Baghdad crude oil using pellets of either anionic, PVC, quartz, PE, PP or
nonionic at different temperature ranging from 30 to 80 °C, pH from 6 to 8, time from 2 to 20 minutes, volume percent
washing water from 5 to 25% and fluid velocity from 0.5 to 0.8 m/s under voltage from 2 to 6 kV and / or using additives
such as alkyl benzene sulphonate or sodium stearate. The optimum conditions and materials were reported to remove
most of water from East Baghdad wet crude oil.
This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe effect of applied current on protection of carbon steel in 0.1N NaCl solution (pH=7) was investigated under flow conditions (0-0.262 m/s) for a range of temperatures (35-55°C) using rotating cylinder electrode. Various values of currents were applied to protect steel from corrosion, these were Iapp.=Icorr., Iapp.=2Icorr. and Iapp.=2.4Icorr. under stationary and flow conditions. Corrosion current was measured by weight loss method. The variation of protection potential with time and rotation velocity at various applied currents was assessed. It is found that the corrosion rate of carbon steel increases with rotation velocity and
has unstable trend with temperature. The protection current required varies with temperature and it inc