Preferred Language
Articles
/
jih-2883
Exponentially Fitted Diagonally Implicit EDITRK Method for Solving ODEs
...Show More Authors

This paper derives the EDITRK4 technique, which is an exponentially fitted diagonally implicit RK method for solving ODEs . This approach is intended to integrate exactly initial value problems (IVPs), their solutions consist of linear combinations of the group functions  and  for exponentially fitting  problems, with  being the problem’s major frequency utilized to improve the precision of the method. The modified  method EDITRK4 is a new three-stage fourth-order exponentially-fitted diagonally implicit approach for solving IVPs with functions that are exponential as solutions. Different forms of -order ODEs must be derived using the modified system, and when the same issue is reduced to a  framework of equations that can be solved using conventional RK approaches, numerical comparisons must be done. The findings show that the novel approach is more efficacious than previously published methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 14 2003
Journal Name
Journal Of Engineering
Slope Stability of Embankments by the Finite Element Method
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Reducing the Water Hardness by Using Electromagnetic Polarization Method
...Show More Authors

Hard water does not pose a threat to human health but may cause precipitation of soap or results stone in the boilers. These reactions are caused by the high concentrations of Ca and Mg. In the industry they are undesirable because of higher fuel consumption for industrial use .Electromagnetic polarization water treatment is a method which can be used for increasing the precipitation of Ca 2+ and CO3 2- ions in hard water to form CaCO3 which leads to decrease the water hardness is research has been conducted by changing the number of coil turns and voltage of the system. The spectroscopy electron microscope was used for imaging the produced crystals. Results of the investigation indicated that

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Time Series Analysis of Baghdad Rainfall Using ARIMA Method
...Show More Authors

Monthly rainfall data of Baghdad meteorological station were taken to study the time behavior of these data series. Significant fluctuation,very slight increasing trend and significant seasonality were noticed. Several ARIMA models were tested and the best one were checked for the adequacy. It is found that the SEASONAL ARIMA model of the orders SARIMA(2,1,3)x(0,1,1) is the best model where the residual of this model exhibits white noise property, uncorrelateness and they are normally distributed. According to this model, rainfall forecast for four years was also achieved and showing similar trend and extent of the original data.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Image Segmentation Using Superpixel Based Split and Merge Method
...Show More Authors

A super pixel can be defined as a group of pixels, which have similar characteristics, which can be very helpful for image segmentation. It is generally color based segmentation as well as other features like texture, statistics…etc .There are many algorithms available to segment super pixels like Simple Linear Iterative Clustering (SLIC) super pixels and Density-Based Spatial Clustering of Application with Noise (DBSCAN). SLIC algorithm essentially relay on choosing N random or regular seeds points covering the used image for segmentation. In this paper Split and Merge algorithm was used instead to overcome determination the seed point's location and numbers as well as other used parameters. The overall results were better from the SL

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Treatment of Furfural Wastewater by (AOPs) Photo-Fenton Method
...Show More Authors

The objective of this study is to investigate the application of advanced oxidation processes (AOPs) in the treatment of wastewater contaminated with furfural. The AOPs investigated is the homogeneous photo-Fenton (UV/H2O2/Fe+2) process. The experiments were conducted by using cylindrical stainless steel batch photo-reactor. The influence of different variables: initial concentration of H2O2 (300-1300mg/L), Fe+2(20-70mg/L), pH(2-7) and initial concentration of furfural (50-300 mg/L) and their relationship with the mineralization efficiency were studied.

 Complete mineralization for the system UV/H2O2/Fe+2 was achieved at: initi

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF