This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic signal becomes wider (2 a.u.) than in the first case. So, this system can be used in many physical applications, such as encrypting confidential information.
The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner, Taylor manner and block- by- block(2, 3, 5).
The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe purpose of this study is to assess the performance of government units (Iraqi hospitals) by trying to determine the possibility of the current governmental accounting system to provide information on the performance reports of government units. In order to improve the efficiency of hospital resources management, the services provided by the hospital should be subject to performance measurement and evaluation The importance of the health sector in the provision of services, in order to raise the efficiency of the performance of services provided by government units has reached the researcher a set of conclusions, the most important
- The financial reports produced by the accounting s
In this paper, numerical and experimental studies on the elastic behavior of glass fiber reinforced polymer (GFRP) with stiffeners in the GFRP section's web (to prevent local buckling) are presented. The GFRP profiles were connected to the concrete deck slab by shear connectors. Two full-scale simply supported composite beams (with and without stiffeners) were tested under impact load (three-point load) to assess its structural response. The results proved that the maximum impact force, maximum deflection, damping time, and damping ratio of the composite beam were affected by the GFRP stiffeners. The experimental results indicated that the damping ratio and deflection were diminished compare
... Show MoreThe construction of highly safe and durable buildings that can bear accident damage risks including fire, earthquake, impact, and more, can be considered to be the most important goal in civil engineering technology. An experimental investigation was prepared to study the influence of adding various percentages 0%, 1.0%, and 1.5% of micro steel fiber volume fraction (Vf) to reactive powder concrete (RPC)—whose properties are compressive strength, splitting tensile strength, flexural strength, and absorbed energy—after the exposure to fire flame of various burning temperatures 300, 400, and 500 °C using gradual-, foam-, and sudden-cooling methods. The outcomes of this research proved that the maximum reduction in mechanical prop
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show More