The aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .
In this work, pure and copper mixed oxide PAni nanofiber thin films are successfully synthesized on silicon substrates by hydrothermal method and spin coating technique at room temperature with thickness of about 325 nm. The structural, surface morphological, optical and photoconductivity properties have been investigated. The XRD results showed that PAni films have crystalline nature, CuO and PAni/CuO nanostructure composites are monoclinic polycrystalline structure. The FESEM images of PAni clearly indicate that it has nanofiber-like structure, whereas the CuO film has spongelike shape. The surface morphology analysis of PAni/CuO composite shows that nanofiber caped with inorganic material which is CuO is a core-shell structure. Op
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
The present study tackles the scientific model and the mechanisms of operating in the formation of the image of the artistic work to create a scene that cares for the aesthetic decoration through raw and techniques and employing them to express the aesthetic values that care for what is not familiar and deviation from the familiar in the visual exhibition and the care for the employment of the technical abilities, lighting, and sound as well as the employment of multiple materials. The research presents the objectives of his study in the exhibition hall of Natural History Museum (University of Baghdad) to create an aesthetic and expressive state at the same time. Then, in the theoretical framework the researcher traces the experiments of
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution