Preferred Language
Articles
/
bsj-5504
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 25 2012
Journal Name
The Nineteenth Scientific Conference The College Of Education \al-mustansiriyah University
Solution of Ordinary BVP's of Eighth Order Using Osculatory Interpolation Technique
...Show More Authors

The aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.

View Publication
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Some properties of the Osvillatory and nonoscillatory solutions of second order
...Show More Authors

in this paper sufficient conditions of oscillation of all of nonlinear second order neutral differential eqiation and sifficient conditions for nonoscillatory soloitions to onverage to zero are obtained

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Classification of the Projective Line over Galois Field of Order 31
...Show More Authors

Our research is related to the projective line over the finite field, in this paper, the main purpose is to classify the sets of size K on the projective line PG (1,31), where K = 3,…,7 the number of inequivalent K-set with stabilizer group by using the GAP Program is computed.

View Publication
Scopus Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Abstract And Applied Analysis
Dynamical Behaviors of a Fractional-Order Three Dimensional Prey-Predator Model
...Show More Authors

In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Magic Square of Order 3 To Solve Sudoku Grid Problem
...Show More Authors

   The research tackled to solve Sudoku grid problem 9 ×9 , one of artificial intelligence problems. This problem has many of solutions in search space to generate Sudoku grid by using magic square of odd order as 3. This research concludes solution by proposed heuristic algorithm from magic square of odd order as 3 and no given numbers (from 1 to 9) in each cell of nine Sudoku grid cells in starting of problem solution, this is not similar the solution in old classic methods to generate all sub grids in Sudoku grid. The experimental results in this paper show the easily implementation to solve the problem to manage without manual method, additional to position of numbers (1, 2,..9) in center of each sub grid in Sudoku grid

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 09 2023
Journal Name
Nonlinear Functional Analysis And Applications
SEVEN-PARAMETER MITTAG-LEFFLER OPERATOR WITH SECOND-ORDER DIFFERENTIAL SUBORDINATION RESULTS
...Show More Authors

This paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.

Preview PDF
Scopus
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Classifying Illegal Activities on Tor Network using Hybrid Technique
...Show More Authors

    With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Synthesis and Characterization of P3HT Metal Nanoparticles Hybrid Junction
...Show More Authors

In this work the fabrication and characterization of poly(3-hexylthiophene) P3HT-metallic nanoparticles (Ag, Al). Pulsed Laser Ablation (PLA) technique was used to synthesis the nanoparticles in liquid. The Fourier Transformer Infrared (FTIR) for all samples indicate the chemical interaction between the polymer and the nanoparticles. Scanning Electron Microscopic (SEM) analysis showed the particle size for P3HT-AgNps samples between 44.50 nanometers as well the spherical structure. While for P3HT-AlNps samples was flakes shape. Energy Dispersive X-ray (EDX) spectra show the existing of amount of metallic nanoparticles.

View Publication Preview PDF
Crossref