An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LTADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions and consecutive error are presented. Two applications are presented as examples of how the proposed technique can be utilised to obtain analytical or numerical solutions for certain kinds of Random Integro Differential Equations (RIDEs) in order to demonstrate its efficacy and potential.
The objective of this research is to analyze the relationship between the Factors of critical success and sustainable competitive advantage, and I have tested Search Company Mu'tasim General Contracting, through applied on a sample of (90) manager, engineer and project manager, spread over sections and the company's projects surveyed. has been selected sector construction industry as one of the sectors vital and important that play a major role in the advancement of Iraq's infrastructure under the current circumstances, which epresent a set of Projects are Mu'tasim General Contracting construction imple
... Show MoreOrganizations nowadays, whether public or private organizations, productive or service (such as banks), face major challenges as a result of rapid and continuous changes, and in front of these challenges traditional management operations and tools become unable to make the organization able to work, which makes it imperative for these organizations to follow the methods and management practices, including the proposed knowledge risk management and strategic direction so that it can elevate its actions at the level of developments in reality, in the sense that these organizations and in the light of environmental developments to characterize their strategic direction as an intellectual approach characterized by mo
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show Moreالمواقف افي الدول العربية قراءة تحليلية في مواقف لدولية من التغيير (الولايات المتحدة - الاتحاد الاوروبي - روسيا)
The research aims at determining the main reason for the deterioration of the services and determining the correct method of distributing the funds to the administrative and administrative units. The discrepancy between the size of the financial allocations and the municipal services was the main research problem. Therefore, the researcher identified the gaps in municipal services by the concerned departments and compared them with The percentage of funds obtained through the work of a checklist for each of the directorates concerned. The researcher studied the specific criteria for these services, which were approved by the Ministry of Construction, Housing, Municipalities, and Public Works, and compared them wi
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More