In this paper, the time-fractional Fisher’s equation (TFFE) is considered to exam the analytical solution using the Laplace q-Homotopy analysis method (Lq-HAM)â€. The Lq-HAM is a combined form of q-homotopy analysis method (q-HAM) and Laplace transform. The aim of utilizing the Laplace transform is to outdo the shortage that is mainly caused by unfulfilled conditions in the other analytical methods. The results show that the analytical solution converges very rapidly to the exact solution.
This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreAn Alternating Directions Implicit method is presented to solve the homogeneous heat diffusion equation when the governing equation is a bi-harmonic equation (X) based on Alternative Direction Implicit (ADI). Numerical results are compared with other results obtained by other numerical (explicit and implicit) methods. We apply these methods it two examples (X): the first one, we apply explicit when the temperature .
In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti
... Show MoreThe educational service industry is one of the most negatively affected industries by the spread of the COVID-19 pandemic. Government agencies have taken many measures to slow its spread, and then restrict movement and gatherings and stop recreational activities. Furthermore, the repercussions of the curfew had a significant impact due to the interruption in actual attendance for students and employees, and the severity of the Covid-19 crisis and its (economic, social, security, humanitarian and behavioral) effects on all societies and work sectors is no secret to anyone. Iraq, like other countries, was also affected by the negative impact of Covid-19 pandemic in all fields of institutional work, especially public fields, and specifically t
... Show Moreملخص البحث باللغة الإنجليزية
The concept of the phenomenon of nuns: an analytical ideological study
Dr. Samia bint Yassin Al-Badri
Department of Islamic Doctrine & Contemporary Ideologies
College of Shariʿah & Islamic Studies
Qassim University
The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:
The concept of the phenomenon of nuns, an analytical doctrinal study
The study concluded with resu
... Show MoreA program in Visual Basic language was designed to calculate the time interval of radio storm by predict their type at specific Local Time (LT) from Baghdad location, such storms result from the Central Meridian Longitude (CML) of system ΙΙΙ for Jupiter and phase of Io’s satellite (ФIo). These storms are related to position of Io (Io- A,B,C,D). The input parameters for this program were the observer’s location (longitude), year, month and day. The output program results in form of tables provide the observer information about the date and the LT of beginning and end of each type of emitted storm. The year 2011 was taken to apply the results within twelve month; the results of the time interval of radio storm were between (0.08h-5
... Show More