The wavelets have many applications in engineering and the sciences, especially mathematics. Recently, in 2021, the wavelet Boubaker (WB) polynomials were used for the first time to study their properties and applications in detail. They were also utilized for solving the Lane-Emden equation. The aim of this paper is to show the truncated Wavelet Boubaker polynomials for solving variation problems. In this research, the direct method using wavelets Boubaker was presented for solving variational problems. The method reduces the problem into a set of linear algebraic equations. The fundamental idea of this method for solving variation problems is to convert the problem of a function into one that involves a finite number of variables. Different numerical examples were given to demonstrate the applicability and validity of this method using the Matlab program. Also, the results of this technique were compared with the exact solution, and graphs were added to these examples to test the convergence of Wavelet Boubaker polynomials using this method.
The aims of this study are to measure the defect rate and analyze the problems of production of ready concrete mixture plant by using Six Sigma methodology which is a business strategy for operations improvement depending basically on the application of its sub-methodology DMAIC improvement cycle and the basic statistical tools where the process sigma level of concrete production in the case study was 2.41 σ.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreIn this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the
... Show MoreAbstract :- In this paper, silver nanoparticles had been prepared by chemical reduction method. Many tests had been done to it such as UV-Visible spectrophotometer, XRD, AFM&SEM test. finally an attempt had been done to get the optimum condition to control the grain size of silver Nanoparticles by variation the heating period and other parameters which has an effect in silver Nanoparticles synthesis process. in this method we can get a silver nanoparticles in the size range from 52 to 97 nm.
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreNanoparticle has pulled in expanding consideration with the developing enthusiasm for nanotechnology which hold potential as essential segments for development applications. In the present work, a copper nanoparticle is manufactured as a suspension in distilled water by beating a bulk copper target with laser source (532 nm wavelength, 10 ns pulse duration and 10 Hz repletion rate) via method. UV- visible absorption spectra and AFM analysis has been done to observe the effect of repetition rate for the pulsation of laser. Copper nanoparticles (Cu-NPs) were successfully synthesized with green color. The Cu- NPs have very high purity because the preparation was managed in aqueous media to eliminate ambient contaminations. Absorption
... Show More