Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
Orthogonal polynomials and their moments serve as pivotal elements across various fields. Discrete Krawtchouk polynomials (DKraPs) are considered a versatile family of orthogonal polynomials and are widely used in different fields such as probability theory, signal processing, digital communications, and image processing. Various recurrence algorithms have been proposed so far to address the challenge of numerical instability for large values of orders and signal sizes. The computation of DKraP coefficients was typically computed using sequential algorithms, which are computationally extensive for large order values and polynomial sizes. To this end, this paper introduces a computationally efficient solution that utilizes the parall
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
This article reviews the construction of organic solar cell (OSC) and characterized their optical and electrical properties, where indium tin oxide (ITO) used as a transparent electrode, “Poly (3-hexylthiophene- 2,5-diyl) P3HT / Poly (9,9-dioctylfluorene-alt-benzothiadiazole) F8BT” as an active layer and “Poly(3,4-ethylenedioxythiophene)-poly (styrene sulfonate)” PEDOT: PSS which is referred to the hole transport layer. Spin coating technique was used to prepared polymers thin film layers under ambient atmosphere to make OSC. The prepared samples were characterized after annealing process at (80 ͦ C) for (30 min) under non-isolated circumference. The results show a value of filling factor (FF) of (2.888), (0.233) and (0.28
... Show More
Abstract
The study aims to identify the degree of citizenship values practiced by Bisha University students and identify the impact of gender, college, and academic level, on the degree of the practice of University students for citizenship values. The researcher used the descriptive-analytical method including a questionnaire of (44) items. To process the data, the researcher applied the computational averages, standard deviations, percentages, and T-test. The questionnaire was implemented on a sample of (600) of the 2 and 8 levels during the second semester of the academic year (2020-2019) at Bisha University. The study findings revealed that the degree of the pra
... Show MoreThis research sheds light on the contributions of a group of scientific Kurdish scholars in the seventh and eighth Hijri centuries, who devoted themselves to serving science with the bad political and economic conditions at the time, and the research pointed to the flowering of science and how students travel in order to provide them with science, obtain a scientific certificate, then take up The research efforts of the scholars in the two Hijri century mentioned in the science of the Qur’an, whether in the field of recitations, intonation or interpretation, and the research ends with a conclusion in which I mentioned the most important conclusions reached in this research.
In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
This research paper is about thevariationin the degree of Continentality climate of the
Iraq during (40) years for a number of climate station. Using Poresof formula, it is found out
that the climate of Iraq ranges between extreme Continentality and very extreme
Continentality, and that the Continentality degree is characterized with extreme frequency
from one year to another. In certain years, the degree of climate Continentality decreases
while in other years it rises in such a way that there is no similarity in the Continental degree
from one year to another for the same station.
As for the general trend of the degree of Continentality, the last years had noticed
special variations, which are divided in to thre
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show Moreهناك دائما حاجة إلى طريقة فعالة لتوليد حل عددي أكثر دقة للمعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة لأن الطرق العددية لها محدودة. في هذه الدراسة ، تم حل المعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة باستخدام طريقة متعددة حدود برنولي. الهدف الرئيسي من هذه الدراسة هو ايجاد حل تقريبي لمثل هذه المشاكل في شكل متعددة الحدود في سلسلة من الخطوات المباشرة. أيضا ، تم افتراض أن مقام النواة
... Show More