In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease errors for output force solution. It is obvious from figures how error affects the results and zeroth order stables the solution.
A revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem o
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreIn the present paper we introduce and study new classes of soft separation axioms in soft bitopological spaces, namely, soft (1,2)*-omega separation axioms and weak soft (1,2)*-omega separation axioms by using the concept of soft (1,2)*-omega open sets. The equivalent definitions and basic properties of these types of soft separation axioms also have been studied.
The modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show MoreThe study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show MoreMy research tagged [the lights of the statement in the first part of the Koran] came to show that the dear book was developed according to a precise linguistic system is not increased by a word or letter or movement - Aldmh and Kira and the hole - and does not lack anything of it except with the wisdom required by the meanings of the Koranic text or Sura generally . The Koran does not come falsehood from his hands or from behind it is infallible and preserved; because it was revealed by the sage Hamid Hamid ﭽﮗ ﮘ ﮙ ﮚ ﮛ ﮜ ﮝ ﮞ ﭼ [stone]. The Qur'an is safe from any verbal or moral dominance and dominates all the heavenly books and exists at any time and place that speaks the truth ﭽ ﯛ ﯜ ﯝ ﯞ ﯟ ﯹ ﯺﭼ [The
... Show MoreThis research deals with a shrinking method concernes with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained v
... Show MoreThis paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
The aim of study was making comparison in some kinematics variables in (100) meter butterfly swimming to first and second ranking in championship 2003 Espana, so noticed there is no such like this study in our country in comparison study for international champions therefore not specific and scientific discovering to these advanced levels, also the researchers depend on group of kinematics variables when the comparison making and it was included (50 meter the first, 50 meter the second, the differences between the first (50) meter and the second , more over basic variables in (100) meter butterfly , after having the results and treat it statistically the researchers reaches to two conclusions which was: • Success the first rank in startin
... Show More