Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreRoof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the
... Show MoreThis paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed
... Show MoreSchiff base N,N'-Bis-(4-dimethylamino-benzylidene)-benzene-1,4-diamine has been synthesized from 4-dimethylaminobenzenaldehyde and benzene-1,4-diamine. The structure of Schiff base was obtained by (C.H.N.) microanalysis, Mass, 1HNMR, FT-IR and UV-Vis spectral methods and thermal analysis. Metal mixed ligand complexes of some metal(II) salts with Schiff base ligand and anthranilic acid were prepared in the molar ratio (1:2:2), (Metal):(SBL)2:(Anthra)2, (SBL)= Schiff base ligand, (Anthra) =anthranilic acid and Metal= Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II). The thermal behaviour (TGA) of the complexes was studied. The prepared complexes identified by using mass, thermal analysis, FT.IR and UV-Vis spectrum methods, on otherwise flame
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
The aim of this study was to know the inhibition activity of squeezed grape waste extract on Bacillus stearpthermophilus by using three different tempretures degree 40, 60 and 80c, in order to reduce the time exposure of food for preservation. This study include two branchs: First: isolation and identification of Bacillus stearothermophilus from soil, 5 sample were collected from the soil of the college agriculture/Baghdad university. Samples were cultured on nutrient agar, microscopic and culturing tests were conducted and many biochemical tests were done. The isolates were cultivated at 55 c and 65 c for differentiate it from Bacillus coagulans which is can't grow at 65 co. The c
... Show MoreWhen the guard honey bees, Apis mellifera L., form a clump at the hive entrance or on the flight board, the oriental hornet, Vespa orientails L., either creeps toward the clump or hovers over it in order to take a bee. Once the hornet creeps, only few bees facing the hornet become alert, rock their heads and antennae, open their wings, and take a posture of defense. The rest of the clump stays listless without any signal of concern. However, the clump stays dense and the defending bees do not detach themselves neither from the rest of the clump nor from each other. For this reason, it is very difficult for the hornet to grab a bee unless the latter makes a “mistake” by detaching herself from other adjacent bees. If the hornet grabs s
... Show More