This paper presents an analysis solution for systems of partial differential equations using a new modification of the decomposition method to overcome the computational difficulties. Convergence of series solution was discussed with two illustrated examples, and the method showed a high-precision, being a fast approach to solve the non-linear system of PDEs with initial conditions. There is no need to convert the nonlinear terms into the linear ones due to the Adomian polynomials. The method does not require any discretization or assumption for a small parameter to be present in the problem. The steps of the suggested method are easily implemented, with high accuracy and rapid convergence to the exact solution, compared with other methods that can be used to solve systems of PDEs.
This research is an initial attempt to explore the reality of education and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a set of important issues related to the contemporary Islamic educational system. The research revealed the extent of the need for authentic educational values that draw their reference from the origins of Islam, and it emphasized the analysis of the reality of education in the Islamic world and the identification of its problems and the finding of solutions through a quick and comprehensive look at the diverse contributions of Muslimthinkers to Islamic educational thought, and their active ro
... Show MoreTheatrical techniques took upon themselves the responsibility of building and organizing the theatrical form for the various forms of performances, and it was the important tool that the show makers could rely on in carrying out the various works at the audio-visual level, and lighting is one of the most important elements of the visual formation of the image in the show, as it is related to the visual process and what it can achieve in operations The contrast that constitutes the aesthetic and intellectual values of the theatrical show, especially since the process of adjusting the element of time and the timings for receiving or delivering, moving, and the movement of the actor is what can determine the rhythm of the scene, which in it
... Show MoreEstimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust M method after their development through the use of sequential approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate
... Show MoreSince independence in 1956, several attempts have been made to reform educational practices in the Moroccan education system, while going through several stages:Evaluation of the state of the Moroccan education system, determination of failures and the establishment of an effective strategy to improve the quality of education and training in the Moroccan public school.We focus on monitoring the establishment of the pillars of the reform, against the various difficulties that hinder the development of the education sector, from 1999 until today and towards the horizon of 2030. We provide data on the situation of the reform, then we analyze its various stages from a critical point of view, based on the reports of the court of auditors, to
... Show MorePraise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show More