Preferred Language
Articles
/
hBeLgJEBVTCNdQwC55Wo
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Application of delay integral equations in population growth
...Show More Authors

In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using panel data in structural equations with application
...Show More Authors

The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration.  chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Sculptural Formation in the Third Millennium: Styles and Trends
...Show More Authors

The research studies the sculptural formation in the third millennium: styles and trends, by taking the most important results of sculpture in the third millennium. The problem of the research is to search for the new sculptural formation in what it constitutes of social and human importance, and what are the important factors in forming the   contemporary sculptural structure, and what is the mechanism of showing and producing the new formation. The research requires the study of the most important thing that the (sculptural formation in the third millennium styles and trends) represents. The importance of research depends on the importance of the sculptural formation after the twentieth century and the importance that the for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 12 2025
Journal Name
Journal Of Engineering
Calculation Of Volumeteric And Thermodynamic Properties For Pure Hydrocarbons And Their Mixtures Using Cubic Equations Of State
...Show More Authors

View Publication
Publication Date
Mon Mar 06 2023
Journal Name
Arts
Solving chemical problems among students of the College of Education for Pure Sciences, Ibn al-Haytham
...Show More Authors

Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Dual-Layer Compressive Sensing Scheme Incorporating Adaptive Cross Approximation Algorithm for Solving Monostatic Electromagnetic Scattering Problems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
CUSTOM ANALYSIS THROUGH Nth ORDER GAUSSIAN NOISE
...Show More Authors

Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Gamipog: A deterministic genetic multi-parameter-order strategy for the generation of variabLE STRENGTH COVERING ARRAYS
...Show More Authors

Preview PDF
Scopus (4)
Scopus
Publication Date
Mon Jul 25 2022
Journal Name
2022 Ieee 20th International Conference On Industrial Informatics (indin)
Robust Continuous Sliding Mode Controller for Uncertain Canonical Brunovsky Systems Using Reduced Order Extended State Observer
...Show More Authors

A reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref