In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
An experiment was carried out in the fields that belong to agiriculture college /Baghdad university (AL-Jadyria) according to randomized compeleted blocks design(R.C.B.D.) with three replications during the spring season of 2015 to Study impact of growing point pinching and foliar spraying of whey on some traits of vegetative growth and yield of okra(Abelmoschus esculentus L.Moench) AL-Batra local cultivar.The experiment was included six treatments which was pinching or no pinching of growthing point and foliar spraying of whey with three concentration (0%,50%and75%).The results showed that pinching was siginificant in all traits of vegetative growth except plant High where the highest values of branches number , diameter of stem and leafe
... Show MoreAn investigation was conducted for dewaxing of lubricating oil fraction by urea to reduce the pour point.In this study mixture of 45 % methyl ethyl ketone (MEK) and 55 % toluene was used as a solvent. The studied variables are mixing time (10-70 min), solvent to oil volume ratio (0.5:1- 2:1), urea to wax weight ratio (2- 6) and constant mixing speed 1500 rpm. By analysis of the experimental results, the best operating conditions achieved are mixing time 40 min, solvent/oil 2:1 volume ratio, and urea/wax 4:1 weight ratio. At these conditions the pour point of the lubricating oil decreases from 24 ° C to -13 °C.
The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreIn this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreMany numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.