An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LTADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions and consecutive error are presented. Two applications are presented as examples of how the proposed technique can be utilised to obtain analytical or numerical solutions for certain kinds of Random Integro Differential Equations (RIDEs) in order to demonstrate its efficacy and potential.
Many production companies suffers from big losses because of high production cost and low profits for several reasons, including raw materials high prices and no taxes impose on imported goods also consumer protection law deactivation and national product and customs law, so most of consumers buy imported goods because it is characterized by modern specifications and low prices.
The production company also suffers from uncertainty in the cost, volume of production, sales, and availability of raw materials and workers number because they vary according to the seasons of the year.
I had adopted in this research fuzzy linear program model with fuzzy figures
... Show MoreThis study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
In this work, the dyes Rhodamine B and Coumarin 102 containing titanium dioxide nanoparticles were used as scattering centers to fabricate a random gain medium. The laser dye was dissolved in hexanol and methanol solvent respectively. The titanium dioxide nanoparticles were synthesized by DC reaction magnetron spraying technique. The random-gain medium was made by adding 2.5 mg of titanium dioxide nanoparticles to Rhodamine and coumarin 102 dyes by coating the glass cell with two-sided titanium dioxide with high spectral efficiency and low production cost. A narrow line optical emission was detected at 565 nm for Rhodamine B and 534 nm for coumarin 102, where it was found that rhodamine B dye has FWHM 8 nm and coumarin dye 102 has FWHM 9 nm
... Show More
The study is designed to identify intestinal parasitic infections examined at Al-Aziziyah Hospital in Wasit Governorate in Iraq. In this study, a total of (460) internal and external patients were monitored for intestinal parasitic infections. All stool samples were analyzed by the direct method (microscopic exam.) to discover the trophozoite stages and cyst stages for intestinal protozoan parasites. The most incidence parasites in different sex, area residence and different age groups. Out of (460) patient sample were infected with 217 at a percentage of (47.17%), 101(46.5%) were for males and 116 (53.5%) were for females. It was found that the numbers and percentages of a single (one
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show More