This paper presents an alternative method for developing effective embedded optimized Runge-Kutta (RK) algorithms to solve oscillatory problems numerically. The embedded scheme approach has algebraic orders of 5 and 4. By transforming second-order ordinary differential equations (ODEs) into their first-order counterpart, the suggested approach solves first-order ODEs. The amplification error, phase-lag, and first derivative of the phase-lag are all nil in the embedded pair. The alternative method’s absolute stability is demonstrated. The numerical tests are conducted to demonstrate the effectiveness of the developed approach in comparison to other RK approaches. The alternative approach outperforms the current RK methods.
Four Co(II), (C1); Ni(II), (C2); Cu(II), (C3) and Zn(II), (C4) chelates have been synthesized with 1-(4-((2-amino- 5‑methoxy)diazenyl)phenyl)ethanone ligand (L). The produced compounds have been identified by using spectral studies, elemental analysis (C.H.N.O), conductivity and magnetic properties. The produced metal chelates were studied using molar ratio as well as sequences contrast types. Rate of concentration (1 ×10 4 - 3 ×10 4 Mol/L) sequence Beer’s law. Compound solutions have been noticed height molar absorptivity. The free of ligand and metal chelates had been applied as disperse dyes on cotton fabrics. Furthermore, the antibacterial activity of the produced compounds against various bacteria had been investigated. F
... Show MoreAbstract
The use of electronic valves is commonly available. yet, the most
common is the techniques of communications as prod casting transmitter that
are used by these valves in addition to their use in communication tools as far
distance telephone, electronic measuring techniques , and others.
In this study, an attempt is endeavored for improving the efficiency of the
vacuum micro- valves(GI-19b) through activating their internal surfaces by the
use of ionic pumping which is used for treating valves which are out of order
(because of sedimentation some materials and oxide on its poles). The
existence of these materials and oxide increase the sum of current leakage
moving in between. The use of ionic pumpin
This research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.
That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentatio
... Show MoreIn this research, we study the classical continuous Mixed optimal control vector problem dominated by couple nonlinear elliptic PDEs. The existence theorem for the unique state vector solution of the considered couple nonlinear elliptic PDEs for a given continuous classical mixed control vector is stated and proved by applying the Minty-Browder theorem under suitable conditions. Under suitable conditions, the existence theorem of a classical continuous mixed optimal control vector associated with the considered couple nonlinear elliptic PDEs is stated and proved.
In this paper, the classical continuous triple optimal control problem (CCTOCP) for the triple nonlinear parabolic boundary value problem (TNLPBVP) with state vector constraints (SVCs) is studied. The solvability theorem for the classical continuous triple optimal control vector CCTOCV with the SVCs is stated and proved. This is done under suitable conditions. The mathematical formulation of the adjoint triple boundary value problem (ATHBVP) associated with TNLPBVP is discovered. The Fréchet derivative of the Hamiltonian" is derived. Under suitable conditions, theorems of necessary and sufficient conditions for the optimality of the TNLPBVP with the SVCs are stated and proved.
The purpose of this research paper is to present the second-order homogeneous complex differential equation , where , which is defined on the certain complex domain depends on solution behavior. In order to demonstrate the relationship between the solution of the second-order of the complex differential equation and its coefficient of function, by studying the solution in certain cases: a meromorphic function, a coefficient of function, and if the solution is considered to be a transformation with another complex solution. In addition, the solution has been provided as a power series with some applications.
This study examined the problematic of the ambiguous relationship between the media and terrorism and the problems that result from press coverage of terroristic incidents. The paper sought to show the classification and confrontation of such incidents had been established from the point of view of a sample of media professionals, researchers and writers who are frequenters of Al-Mutanabi Street in Baghdad. The media outlets that carry this coverage would not give up their media mission as well as the terrorists would not be given an opportunity to take advantage of this coverage in achieving their goals and objectives. Furthermore, the terrorist organizations would have no chance to exploit these means to deliver their terroristic messa
... Show MoreThe study aims to identify the psychological, social, and academic problems that encounter students at the college of education. To this end, the researcher utilized the descriptive approach, where a questionnaire was used as a tool to collect the study data. The findings of study revealed that the main academic problems are inability to understand what the students read, lack of concentration over the process of studying. The Difficulty of preparation for test. Lack of ability to memorize quickly. As for the prominent social problems: the excessive usage of social media that drove students away from their main tasks, the Lack of participation in social activities, the scarcity the religious information. The psychological problems includ
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More