The aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreNeural stem cells (NSCs) are progenitor cells which have the ability to self‑renewal and potential for differentiating into neurons, oligodendrocytes, and astrocytes. The in vitro isolation, culturing, identification, cryopreservation were investigated to produce neural stem cells in culture as successful sources for further studies before using it for clinical trials. In this study, mouse bone marrow was the source of neural stem cells. The results of morphological study and immunocytochemistry of isolated cells showed that NSCs can be produced successfully and maintaining their self‑renewal and successfully forming neurosphere for multiple passages. The spheres preserved their morphology in culture and cryopreserved t
... Show MoreExtraction and preparation of red organic dye from beetroot plant in different concentrations by using the solvent extraction process. Ethanol was the solvent used to prepare five different concentrations at the ratio of (Dye: Ethanol) abbreviated (D: E) 5:0,4:1, 3:2, 2:3,1:4. The optical, structural, and morphological properties are studied for the samples. The results appeared using the UV-Vis spectroscope the maximum peak of absorption (A) spectrum at wavelength Aλmax=480 nm when the transmittance (T) at the same wavelength 25% and the reflectivity 0.8%. Florescent (F) spectrum of beetroot dye is measured at wavelength Fλmax=535nm achieved to redshift about Δλ=55 nm. Also, measured the energy band gap
... Show MorePurpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
Oxazine and quinazoline has a very important in organic chemistry especially in hetero cyclic fields. this research consist the preparation of 4H,4'H-2,2'-bibenzo[d][1,3]oxazine-4,4'-dione compound (1) from di acid chloride with 2-aminobenzoic acid in pyridine as solvent to give compound (2) 3,3'-diamino-2,2'- biquinazoline-4,4'(3H,3'H)-dione .compound 2 include free amino group .this compound was reacted with maleic and phthalic anhydride for synthesized of cyclic imide compounds (3,4).another reaction for compound 2 with some substituted aromatic aldehyde for prepared of some novel Schiff bases (5-9) contains quinazoline ring. compound 1 was treated with sulfathiazole and sulfadiazine for synthesized of sulfa compounds contains sulf
... Show MoreSoil is a crucial component of environment. Total soil analysis may give information about possible enrichment of the soil with heavy metals. Heavy metals, potentially contaminate soils, may have been dumped on the ground. chromium, nickel and cadmium,
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More