A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The present study focuses on synthesizing solar selective absorber thin films, combining nanostructured, binary transition metal spinel features and a composite oxide of Co and Ni. Single-layered designs of crystalline spinel-type oxides using a facile, easy and relatively cost-effective wet chemical spray pyrolysis method were prepared with a crystalline structure of MxCo3−xO4. The role of the annealing temperature on the solar selective performance of nickel-cobalt oxide thin films (∼725 ± 20 nm thick) was investigated. XRD analysis confirmed the formation of high crystalline quality thin films with a crystallite si
KE Sharquie, JR Al-Rawi, AA Noaimi, MM Jabir, Iraqi Postgraduate Medical Journal, 2009
S Khalifa E, AR Jamal R, N Adil A, J Munqithe M…, 2009
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin
... Show MoreIn this study, a cholera model with asymptomatic carriers was examined. A Holling type-II functional response function was used to describe disease transmission. For analyzing the dynamical behavior of cholera disease, a fractional-order model was developed. First, the positivity and boundedness of the system's solutions were established. The local stability of the equilibrium points was also analyzed. Second, a Lyapunov function was used to construct the global asymptotic stability of the system for both endemic and disease-free equilibrium points. Finally, numerical simulations and sensitivity analysis were carried out using matlab software to demonstrate the accuracy and validate the obtained results.