The dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.
The integral transformations is a complicated function from a function space into a simple function in transformed space. Where the function being characterized easily and manipulated through integration in transformed function space. The two parametric form of SEE transformation and its basic characteristics have been demonstrated in this study. The transformed function of a few fundamental functions along with its time derivative rule is shown. It has been demonstrated how two parametric SEE transformations can be used to solve linear differential equations. This research provides a solution to population growth rate equation. One can contrast these outcomes with different Laplace type transformations
To demonstrate the effect of changing cavity length for FM mode locked on pulse parameters and make comparison for both dispersion regime , a plot for each pulse parameter as Lr function are presented for normal and anomalous dispersion regimes . The analysis is based on the theoretical study and the results of numerical simulation using MATLAB. The effect of both normal and anomalous dispersion regimes on output pulses is investigate Fiber length effects on pulse parameters are investigated by driving the modulator into different values. A numerical solution for model equations using fourth-fifth order, Runge-Kutta method is performed through MATLAB 7.0 program. Fiber length effect on pulse parameters is investigated by driving th
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
A method for Approximated evaluation of linear functional differential equations is described. where a function approximation as a linear combination of a set of orthogonal basis functions which are chebyshev functions .The coefficients of the approximation are determined by (least square and Galerkin’s) methods. The property of chebyshev polynomials leads to good results , which are demonstrated with examples.
Abstract :
The study aims at building a mathematical model for the aggregate production planning for Baghdad soft drinks company. The study is based on a set of aggregate planning strategies (Control of working hours, storage level control strategy) for the purpose of exploiting the resources and productive capacities available in an optimal manner and minimizing production costs by using (Matlab) program. The most important finding of the research is the importance of exploiting during the available time of production capacity. In the months when the demand is less than the production capacity available for investment. In the subsequent months when the demand exceeds the available energy and to minimize the use of overti
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show More