In this paper, the Decomposition method was used to find approximation solutions for a system of linear Fredholm integral equations of the second kind. In this method the solution of a functional equations is considered as the sum of an infinite series usually converging to the solution, and Adomian decomposition method for solving linear and nonlinear integral equations. Finally, numerical examples are prepared to illustrate these considerations.
This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.
Radon concentrations are measured for water samples collected from twenty wells which were drilled in Hashimiya area in addition to twelve samples of surface water using Alpha Gaurd. 140 samples, 7 for each well, were collected represent wet season in continuous pumping and 20 samples, one for each well, were collected represent dry season. Concentration of radon in groundwater is many times of its concentration in surface water. The minimum concentration in groundwater is about (7) Bq/L and (5) Bq/L while the maximum concentration is about (31) Bq/L and (19) Bq/L in wet season and dry season respectively. The range of radon concentrations in river water is between (1.06) Bq/L and (1.21) Bq/L. This study has indicated that there is a flo
... Show MoreThe research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreBackground: This study was conducted to evaluate the hard palate bone density and thickness during 3rd and 4th decades and their relationships with body mass index (BMI) and compositions, to allow more accurate mini-implant placement. Materials and method: Computed tomographic (CT) images were obtained for 60 patients (30 males and 30 females) with age range 20-39 years. The hard palate bone density and thickness were measured at 20 sites at the intersection of five anterioposterior and four mediolateral reference lines with 6 and 3 mm intervals from incisive foramen and mid-palatal suture respectively. Diagnostic scale operates according to the bioelectric impedance analysis principle was used to measure body weight; percentages of body fa
... Show MoreRecognition is one of the basic characteristics of human brain, and also for the living creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.
One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit
... Show More
Through research it shows that the calculation has an effective role in the maintenance of Islamic law and save. And that the calculation religious function to attach religious matters and it closeness to God, whether calculated or assumed carried out by volunteers. And scientists from the description of the calculation as a social function to attach to morality and kinship and charity to the poor and the dissemination of science. By definition it shows that the injury will not be exposed only to the evils of any phenomenon that do not break and was checking to search for evil, but he must intervene if he saw visible in front of him. And that of the areas that could see the calculation are the field of information and educ
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More