The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimizing the degree of error between approximate and exact solutions. The Wang-Ball series has shown its usefulness in solving any real-life scenario model as first- or second-order differential equations (DEs).
The main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady. Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.
This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe purpose of this paper is to study the properties of the
partial level density ( ) l g and the total level density g ( ),
numerically obtained as a l sum of ( ) l g up to 34 max l , for
a Harmonic – Oscillator potential well. This method applied the
quantum – mechanical phase shift technique and concentrated
on the continuum region. Also a discussion of peculiarities of
quantal calculation for single particle level density of energy –
dependent potential
Joseph Curtis wrote in his book (Introduction to Semiotics narrative and rhetoric) on the development of a semiotic project in exploring the meaning of communion. The book is rich in theoretical and analytical benefits both in the approach of texts and in the pursuit of letters in search of mechanisms of scriptural and scriptural generation and mechanics in narrative production, especially as the book offers exercises that help to assess the distance separating the narrative spread from the sin of the text, for the semiotics, Refers to the theoretical developments of the science of relations, through the combination of conventional definitions and the representative and comparative limitations, to provide an approach to the application o
... Show MoreSince the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023