Preferred Language
Articles
/
jih-3033
Constructing RKM-Method for Solving Fractional Ordinary Differential Equations of Fifth-Order with Applications
...Show More Authors

This paper sheds the light on the vital role that fractional ordinary differential equations(FrODEs) play in the mathematical modeling and in real life, particularly in the physical conditions. Furthermore, if the problem is handled directly by using numerical method, it is a far more powerful and efficient numerical method in terms of computational time, number of function evaluations, and precision. In this paper, we concentrate on the derivation of the direct numerical methods for solving fifth-order FrODEs  in one, two, and three stages. Additionally, it is important to note that the RKM-numerical methods with two- and three-stages for solving fifth-order ODEs are convenient, for solving class's fifth-order FrODEs. Numerical examples have been analyzed to demonstrate the efficacy of the new methods in comparison to the analytical method. Therefore, the numerical compression is carried out to confirm the efficiency and precision of the modified numerical methods. Significantly, the study demonstrates that the numerical outcomes of the proposed derived and modified numerical applied methods proved to be brilliant. Finally, based on the findings of the study, it could be said that the numerical outcomes of the test-problems using proposed and modified methods agree well with the analytical solutions. Hence, we can conclude that the proposed numerical methods that are derived or modified in the analytic study of this paper are quite efficient.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 11 2024
Journal Name
Eximia
Using an educational method according to special exercises to perform the skill of bow and develop flexibility for cub wrestlers in Iraq
...Show More Authors

creating unique exercises utilizing a teaching approach that works with the research sample, determining how special exercises affect the development of torso flexibility, and determining how special exercises affect the development of bow ability. Activate the search The results of the pre- and post-tests for the control and experimental research groups show a statistically significant association that is favoring the post-test in the development of bow skill performance Using the experimental technique, the researcher set up one group and gave them two tests (pre and post) based on scientific theories that made sense for the topic at hand. Forty adolescent wrestlers from the Adhamiya Club in the Baghdad Governorate were recognized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
The Degree to which Islamic Education Teachers Employ the Strategy of Directed Discovery in Teaching to Develop Higher-Order Thinking Skills
...Show More Authors

The study aimed to know the degree to which Islamic education teachers employ the strategy of directed discovery in teaching to develop higher thinking skills (analysis, synthesis, and evaluation) among sixth-grade students at the basic stage in East Nile Province, Khartoum State - Sudan. The researcher used the descriptive-analytical method, and adopted a questionnaire that consisted of (15) indicators representing the skills of analysis, synthesis, and evaluation as a tool of the study. A random sample of (175) Islamic education teachers was selected, from the Department of Basic Education. The data were analyzed according to the Statistical Packages for Social Sciences (SPSS) program, and the results of the study have shown that the u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Nonlinear optical properties of polymer [PMMA] thin films doped with dye lasing compounds, Rhodamine 6G and Acriflavine in chloroform solvent by using dip coating method
...Show More Authors

The fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase more

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Nonlinear optical properties of polymer [PMMA] thin films doped with dye lasing compounds, Rhodamine 6G and Acriflavine in chloroform solvent by using dip coating method
...Show More Authors

The fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Big Data applications in forecasting corporate bankruptcy: Field analysis in the Saudi Business Environment
...Show More Authors

This study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
The strategy of visual thinking and its applications in teaching arts (photography model): نورا عبد الله علي
...Show More Authors

The study aims at:
1- Identifying the contemporary educational approaches in teaching arts.
2- The effectiveness of using the visual thinking strategy in photography subject for the first year students in the institute of fine arts/Holy city of Kadhimiyah.
The study sample is made of (30 ) first year students (in the institute of fine arts/in Holy city of Kadhimiyah) distributed into two groups, an experimental group made of (15) students and a control group having the same number of students in order to conduct the test. The test for the visual thinking strategy in the subject of photography has been designed and the validity and reliability for the research tool have been verified. In order to demonstrate the results of the

... Show More
View Publication Preview PDF
Crossref