Preferred Language
Articles
/
bsj-6932
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Sol- Gel Synthesis of Hematite Nanoparticles and Photo Degradation of Cibacron Red FN-R Dye
...Show More Authors

This paper describes the synthesis of ?- Fe2O3 nanoparticles by sol-gel route using carboxylic acid(2-hydroxy benzoic acid) as gelatin media and its photo activity for degradation of cibacron red dye . Hematite samples are synthesized at different temperatures: 400, 500, 600, 700, 800 and 900 ?C at 700 ?C the ?-Fe2O3 nanoparticles are formed with particle size 71.93 nm. The nanoparticles are characterized by XRD , SEM, AFM and FTIR . The 0.046 g /l of the catalyst sample shows high photo activity at 3x10-5M dye concentration in acidic medium at pH 3.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Free Vibration Analysis of Laminated Composite plates with General Elastic Boundary Supports
...Show More Authors

In this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current s

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Advanced Pharmaceutical Technology & Research
Use of factorial design in formulation and evaluation of intrarectal in situ gel of sumatriptan
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Jewish Community Holidays
...Show More Authors

      Is a day or series of days celebrated by Jews for religious or worldly important event in Jewish history as an occasion in Hebrew is called Eid יום טוב good day or good or חג תענית celebrate the festival or celebration. Most of the Jewish holidays are of a religious nature, and there is a worldly character with festivals such as the Festival of Lights חג החנוכה the holiday of Purim and the holidays, although a religious appearance, but she celebration in mundane aspects of the history and traditions of the Jewish occasions. Mass over the holidays when Jews are those mentioned in the Bible in my Leviticus and Deuteronomy. And some holidays established by rabbis in the vicinity of the anc

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
"Khurasan statehood" : new centralization of ISIS and limits of incursion and development
...Show More Authors

Abstract This study aims to discover the ways that adopted by extremism to expand to new geographical areas, in order to spread out its ideology, which led to create new geo-strategic zone, aims to recognize ISIS’s strategy to move towards new geographic locations and the motivations behind these transformations, the study also analyses all aspects of this strategy, the group’s relationship with other terrorist groups in these areas and limits of the competition between them. The study also highlights the factors that have led ISIS to move to new geographical areas and its techniques to control them.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Stability of Complement Degree Polynomial of Graphs
...Show More Authors

     A graph is a structure amounting to a set of objects in which some pairs of the objects are in some sense related. The objects correspond to mathematical abstractions called vertices (also called nodes or points) and each of the related pairs of vertices is called an edge (also called link or line). A directed graph is a graph in which edges have orientation. A simple graph is a graph that does not have more than one edge between any two vertices and no edge starts and ends at the same vertex.  For a simple undirected graph G with order n, and let  denotes its complement. Let δ(G), ∆(G) denotes the minimum degree and maximum degree of G respectively. The complement degree polynomial of G is the polynomial CD[G,x]= , where C

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of

... Show More
Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Fractional Brownian motion inference of multivariate stochastic differential equations
...Show More Authors

Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc

... Show More
Scopus (4)
Scopus