The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of non-linear partial differential equations with small amount of computations does not require to calculate restrictive assumptions or transformation like other conventional methods. In addition, several examples clarify the relevant features of this presented method, so the results of this study are debated to show that this method is a powerful tool and promising to illustrate the accuracy and efficiency for solving these problems. To evaluate the results in the iterative process we used the Matlab symbolic manipulator.
This research focuses on shedding light on the most important criteria by which the translator can achieve total success with regard to the translation of scientific texts whose written language in Spanish is greatly influenced by expressions and words adopted from the English language and other world languages, in addition to exposing the most outstanding difficulties that translators face when translating from Spanish to Arabic, giving the most appropriate solutions in this regard.
Resumen
El presente trabajo de investigación se centra en echar luz sobre los criterios más importantes por los cuales el traductor puede conseguir el total éxito en la traducción de los textos científicos cuyo lenguaje
... Show MoreEl español es una lengua hablada por una ingente comunidad que abarca varios cientos de millones de personas. Son muchas las palabras con distintos significados que se escriben de similar manera. Hablamos, por ejemplo, de dos de ellas: el adjetivo solo y el adverbio sólo.
En este trabajo se plantea un estudio del adverbio sólo, palabra invariable cuya función consiste en (complementar la significación del verbo) y solo es un adjetivo (califica a un sustantivo).¿Cómo diferenciarlas para evitar errores ortográficos? Así, en estos casos (solo/ sólo), la distinción la da la tilde en la primera vocal. Ésta es la
... Show MoreStudying translation as academic article has cultural motive side by side academic aim to establish a professional generation that have the ability to serve labor market .
And because translation is important in many sectors in the society such as technology, science, popular institutions, tourism and political and legal relations between countries.
Our investigation concentrate on the articles of translation teaching in fourth class/ Spanish Department/ College of Languages/ Baghdad University for five years in order to evaluate the level of utility of creating translators and interpreters after graduation .
From 2009 until 2014 we saw continuous yearly exchanging in teaching articles by many professors with diff
... Show More In this paper, we proved the existence and uniqueness of the solution of nonlinear Volterra fuzzy integral equations of the second kind.
Oscillation criterion is investigated for all solutions of the first-order linear neutral differential equations with positive and negative coefficients. Some sufficient conditions are established so that every solution of eq.(1.1) oscillate. Generalizing of some results in [4] and [5] are given. Examples are given to illustrated our main results.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show Moreطريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show MoreAbstract
The Non - Homogeneous Poisson process is considered as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).
This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto , to estimate th
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More