Due to its importance in physics and applied mathematics, the non-linear Sturm-Liouville problems
witnessed massive attention since 1960. A powerful Mathematical technique called the Newton-Kantorovich
method is applied in this work to one of the non-linear Sturm-Liouville problems. To the best of the authors’
knowledge, this technique of Newton-Kantorovich has never been applied before to solve the non-linear
Sturm-Liouville problems under consideration. Accordingly, the purpose of this work is to show that this
important specific kind of non-linear Sturm-Liouville differential equations problems can be solved by
applying the well-known Newton-Kantorovich method. Also, to show the efficiency of applying this method
to solve these problems, a comparison is made in this paper between the Newton-Kantorovich method and the
Adomian decomposition method applied to the same non-linear Sturm-Liouville problems under consideration
in this work. As a result of this comparison, the results of the Newton-Kantorovich method agreed with the
results obtained by applying Adomian’s decomposition method.
اندماجات الأعمال من المظاهر الطبيعية في غالبية دول العالم، ورغم المنافع الكثيرة لاندماجات الأعمال إلا أن المخاطر التي تنتج منها أدت إلى تعقد الإجراءات القانونية لتنفيذها بشكل كبير، كما تعد المعالجة المحاسبية للاندماج من القضايا المعقدة جداً وتثير جدلاً واسعاً في الفكر المحاسبي لا سيما في ظل وجود مدخلين يؤثران في متضمنات المعالجة المحاسبية للاندماج أولهما المدخل القانوني الذي يقسم الاندماج إلى ثلاثة أشك
... Show MoreIn this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)
New metal complexes of the ligand 4-[5-(2-hydoxy-phenyl)-[1,3,4- oxadiazol -2-ylimino methyl]-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one (L) with the metal ions Co(II), Ni(II), Cu(II) and Zn(II) were prepared in alcoholic medium. The Schiff base was synthesized through condensate of [4-antipyrincarboxaldehyde] with[2-amino-5-(2-hydroxy-phenyl-1,3,4- oxadiazol] in alcoholic medium . Two tetradentate Schiff base ligand were used for complexation upon two metal ions of Co2+, Ni2+, Cu2+ and Zn2+ as dineucler formula M2L2.4H2O. The metal complexes were characterized by FTIR Spectroscopy, electronic Spectroscopy, elemental analysis, magnetic susceptidbility measurements, and also the ligand was characterized by 1H-NMR spectra, and m
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThis research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More