Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse
... Show MoreIn this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreThis research was conducted in order to monitor and measure the dimensions of media policy in satellite channels directed from the point of view of the communicator, and this research is classified among the descriptive studies, as the researcher used the survey method to answer the questions that were formulated in light of the research problem represented by the main question: What are the dimensions of media policy in Directed satellite channels? .
To achieve the objectives of the study, the researcher used the following tools:
The questionnaire, in order to survey the attitudes of communicators about the extent to which the media policy during crises reflects on their professional standards. The research community is represente
An investigation was conducted for dewaxing of lubricating oil fraction by urea to reduce the pour point.In this study mixture of 45 % methyl ethyl ketone (MEK) and 55 % toluene was used as a solvent. The studied variables are mixing time (10-70 min), solvent to oil volume ratio (0.5:1- 2:1), urea to wax weight ratio (2- 6) and constant mixing speed 1500 rpm. By analysis of the experimental results, the best operating conditions achieved are mixing time 40 min, solvent/oil 2:1 volume ratio, and urea/wax 4:1 weight ratio. At these conditions the pour point of the lubricating oil decreases from 24 ° C to -13 °C.
The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreIn this research, damping properties for composite materials were evaluated using logarithmic decrement method to study the effect of reinforcements on the damping ratio of the epoxy matrix. Three stages of composites were prepared in this research. The first stage included preparing binary blends of epoxy (EP) and different weight percentages of polysulfide rubber (PSR) (0%, 2.5%, 5%, 7.5% and 10%). It was found that the weight percentage 5% of polysulfide was the best percentage, which gives the best mechanical properties for the blend matrix. The advantage of this blend matrix is that; it mediates between the brittle properties of epoxy and the flexible properties of a blend matrix with the highest percentage of PSR. The second stage
... Show MoreThe purpose and goal of the research revolve around the diagnosis of intellectual capital as the logical indicator to study an effective human resource management practice and its influential role in determining the overall quality management of higher education institutions and scientific research in Baghdad.
To achieve the purpose of the research, an upgraded standard questionnaire was used to collect data and distribute it to the selected sample in a statistical manner from the study population of (5) institutions affiliated with the Ministry of Higher Education and Scientific Resear
... Show More