Preferred Language
Articles
/
jeasiq-119
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,979.4$) or approximately (33,747,425 ) million diners Compared to the total cost of the company (310,116.59$) or approximately (38,764,573.75) million diners, as well as this only Models achieves a profit of (40137.19$) dollars or approximately (5,017,148.75) million diners.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2010
Journal Name
College Of Education Journal, Al-mustansiriyah University
Artin Characters for the Special Linear Group SL(2,p) where p is a prime number  19
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Convergence Analysis for the Homotopy Perturbation Method for a Linear System of Mixed Volterra-Fredholm Integral Equations
...Show More Authors

           In this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
comparison between the methods estimate nonparametric and semiparametric transfer function model in time series the Using simulation
...Show More Authors

 The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method  local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Social solidarity in religions        Three / critical study
...Show More Authors

The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
       The researcher has taken a short course in the hearts of the beloved to hearts.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On S-acts and bounded linear operators
...Show More Authors

The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Linear attenuation coefficient measurement in polymer composite
...Show More Authors

Linear attenuation coefficient of polymer composite for beta particles and bremsstrahlung ray were investigated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy range from 0.1-1.1 MeV. The present results show the capability of this composite to absorber beta particles and bremsstrahlung ray that yield from it. That’s mean it is useful to choice this composite for radiation shielding of beta ray with low thickness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Solving the created ordinary differential equations from Lomax distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.