In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease errors for output force solution. It is obvious from figures how error affects the results and zeroth order stables the solution.
The purpose of this research is to identify the E-signing and its concept.
Due to the increasing role and importance of the E-trade in may countries, as it provide many advantages over the traditional trade. We have to deal with may E-trade aspects and tools in which the E-signing is the most important. In this research we will deal: first with the article approach- E-signing definition, Digital signing, its mechanism, requirements, types and features. Second: the practical approach: It has been implemented according to a questionnaire contain many questions some of them are comma, other an specialized in research hypothesis and some concern the obstacles faced the application of E-signing. The questionnaires been distillated to
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show Moreاستخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي
تشخيص عوامل النجاح الحرجة لتفعيل استخدام الحاسوب الشخصي
Transportation problems are considered as a type of operation research problems. In fact, they deal with scheduling transportation of goods from their source to delivery sites in the minimum cost.
Such problems can be solved by the available traditional methods, which include; North-West corner, Least cost and Vogel’s method. As well as if this transportation problem is considered as a linear program it can also be solved by using Simplex method
The goal of the present study is to compare different research methods to provide the optimal and minimum cost.
This study was applied to resolve a transportation problem related to land Transportation Company, w
... Show Moreمكانية استخدام السوق المالية في التنبؤ بالدورات الاقتصادية
In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3 in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled in the bottom of TESB of vertical SC. The TESB was
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MoreThe scientific and technological developments and their practical applications in all fields of life in general and in the education field in specific have led to the emergence of variables in the educational structure, teaching methods and in education in their modern form which is consistent in its entirety with the spirit of the age. We today live the age of knowledge increase full of wide ranging scientific and technological developments. Thus life demands human capabilities of a special kind able to develop and innovate. Here the increasing significance emerges for taking care of the human powers through educational systems much different from those current traditional systems. System
... Show MoreObjective: The study aim is to identify factors that may contribute to children’s weight status variations. Methodology: A descriptive cross sectional study is carried out has been conducted at the AL- Samawah city in Primary Health Care Centers for the purpose of the screening children’s weight status of Age One to five Years Old. This study is started from December 16th 2018 to February 14th 2019. A(non propriety) purposive sample comprised of (20) primary health centers (10 main and 10 sub) are selected of 500 children who visit the primary health care center during the period for the purpose of the study; Data was collected through using a questionnaire designed and developed for the purpose of the study . It consists of two main
... Show More