This paper is concerned with introducing an explicit expression for orthogonal Boubaker polynomial functions with some important properties. Taking advantage of the interesting properties of Boubaker polynomials, the definition of Boubaker wavelets on interval [0,1) is achieved. These basic functions are orthonormal and have compact support. Wavelets have many advantages and applications in the theoretical and applied fields, and they are applied with the orthogonal polynomials to propose a new method for treating several problems in sciences, and engineering that is wavelet method, which is computationally more attractive in the various fields. A novel property of Boubaker wavelet function derivative in terms of Boubaker wavelet themselves is also obtained. This Boubaker wavelet is utilized along with a collocation method to obtain an approximate numerical solution of singular linear type of Lane-Emden equations. Lane-Emden equations describe several important phenomena in mathematical science and astrophysics such as thermal explosions and stellar structure. It is one of the cases of singular initial value problem in the form of second order nonlinear ordinary differential equation. The suggested method converts Lane-Emden equation into a system of linear differential equations, which can be performed easily on computer. Consequently, the numerical solution concurs with the exact solution even with a small number of Boubaker wavelets used in estimation. An estimation of error bound for the present method is also proved in this work. Three examples of Lane-Emden type equations are included to demonstrate the applicability of the proposed method. The exact known solutions against the obtained approximate results are illustrated in figures for comparison
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreIn this work Nano crystalline (Cu2S) thin films pure and doped 3% Al with a thickness of 400±20 nm was precipitated by thermic steaming technicality on glass substrate beneath a vacuum of ~ 2 × 10− 6 mbar at R.T to survey the influence of doping and annealing after doping at 573 K for one hour on its structural, electrical and visual properties. Structural properties of these movies are attainment using X-ray variation (XRD) which showed Cu2S phase with polycrystalline in nature and forming hexagonal temple ,with the distinguish trend along the (220) grade, varying crystallites size from (42.1-62.06) nm after doping and annealing. AFM investigations of these films show that increase average grain size from 105.05 nm to 146.54 nm
... Show MoreIn this paper, we introduce a new complex integral transform namely ”Complex Sadik Transform”. The
properties of this transformation are investigated. This complex integral transformation is used to reduce
the core problem to a simple algebraic equation. The answer to this primary problem can than be obtained
by solving this algebraic equation and applying the inverse of complex Sadik transformation. Finally,
the complex Sadik integral transformation is applied and used to find the solution of linear higher order
ordinary differential equations. As well as, we present and discuss, some important real life problems
such as: pharmacokinetics problem ,nuclear physics problem and Beams Probem
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreThe objective of this study is to estimate the effect of the hydro-ethanolic catechin extract toward blood glucose, lipid profile and liver functions in alloxan diabetic mice. 50 healthy mice (25-30 g) were divided into five groups of ten animals for each. Group A received normal saline as normal control group. To induce diabetes, alloxan (150 mg/kg), intraperitoneal (i.p.) single dose was injected to groups B, C, D and E. Group B represents diabetic control group. Groups C, D and E received ethanolic catechin extract (30 mg/kg and 40 mg/kg) for different periods of 1, 2 and 3 weeks as treated groups. Blood glucose, serum lipids [Total Cholesterol (TC), Triglycerides (TGs) and High Density Lipoproteins (HDL)], asparagine transaminase (AST),
... Show MoreIn this paper, a new class of non-convex functions called semi strongly (