This paper is devoted to the analysis of nonlinear singular boundary value problems for ordinary differential equations with a singularity of the different kind. We propose semi - analytic technique using two point osculatory interpolation to construct polynomial solution, and discussion behavior of the solution in the neighborhood of the singular points and its numerical approximation. Two examples are presented to demonstrate the applicability and efficiency of the methods. Finally, we discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems.
The support qualitative information regards as an additional step in the process of decision-making where the method following by companies to provide information help in the creation of value because it is very important to deliver information to investors about their stratigies and what happen truly inside the companies i.e. every case relating with the expectations of stockhotslder and the prices of markets depending on those expectation ,and if the matter isn’t that there will be lack of confidence thate couldn’t be backed again. The decisions of the investors effected by security ,economic ,political, psychological, emotional ,and financial factors .
... Show MoreIn this paper, a sufficient condition for stability of a system of nonlinear multi-fractional order differential equations on a finite time interval with an illustrative example, has been presented to demonstrate our result. Also, an idea to extend our result on such system on an infinite time interval is suggested.
Discrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreTHE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
The BEK family of flows have many important practical applications such as centrifugal pumps, steam turbines, turbo-machinery and rotor-stator devices. The Bödewadt, Ekman and von Kármán flows are particular cases within this family. The convective instability of the BEK family of rotating boundary-layer flows has been considered for generalised Newtonian fluids, power-law and Carreau fluids. A linear stability analysis is conducted using a Chebyshev collocation method in order to investigate the effect of shear-thinning and shear-thickening fluids for generalised Newtonian fluids on the convective Type I (inviscid crossflow) and Type II (viscous streamline curvature) modes of instability. The results reveal that shear-thinning power-law
... Show MoreA Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study nutrient and water use efficiency of broccoli cultivated hydroponically on alternative solution ABEER. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O2 and O3), Then levels of second factor were randomly distributed within each replicate, which included spraying with plants extracts which was Moringa leaves extract and Coconut water at two concentrations 2, 4 %and 5
Perhaps masculinity and femininity in our Arabic language are among the linguistic issues that have occupied the attention of researchers, ancient and modern. Many books, works, and research have been written on this subject, but there is still something in it that must be revealed, clarified, and established, as the ancients did not classify the feminine and masculine into real, metaphorical, auditory, analogical,
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
The author obtain results on the asymptotic behavior of the nonoscillatory solutions of first order nonlinear neutral differential equations. Keywords. Neutral differential equations, Oscillatory and Nonoscillatory solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More