An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LTADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions and consecutive error are presented. Two applications are presented as examples of how the proposed technique can be utilised to obtain analytical or numerical solutions for certain kinds of Random Integro Differential Equations (RIDEs) in order to demonstrate its efficacy and potential.
Vitamins play an important role in the human health, and thus they are the kind of major nutrients in the body. Chemical products perform numerous physiological functions and can jeopardize health jointly in their absence and surplus. Therefore, it is necessary to establish methods for observation vitamin levels in various molds. In this review paper, the most methods of determination used are high performance liquid chromatography (HPLC), spectrophotometric and potentiometric techniques by listed the value of : slope, linear range, correlation coefficient, detection limit, the max of wavelength and PH and compared with these methods.
This study aims to model the flank wear prediction equation in metal cutting, depending on the workpiece material properties and almost cutting conditions. A new method of energy transferred solution between the cutting tool and workpiece was introduced through the flow stress of chip formation by using the Johnson-Cook model. To investigate this model, an orthogonal cutting test coupled with finite element analysis was carried out to solve this model and finding a wear coefficient of cutting 6061-T6 aluminum and the given carbide tool.
The research aims to identify the digital repository of the University of Baghdad, explain its features, how to register, explaining the mechanism for adding and retrieving research. In addition to identifying the number of people registered in and the number of intellectual outputs stored in it. The descriptive approach and survey methods were adopted by visiting the repository's website and the websites of the University of Baghdad's formations during the period (1-6/4/2024). The theoretical framework included an explanation of the concept of the digital repository, the importance of repositories, their features, and types, with reference to models of Iraqi, Arab, and foreign university digital repositories. The practical framework of the
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreTo study the comparative use of some soil minerals (zeolite, bentonite, phosphate rock, and limestone) in the adsorption and release of lead and its removal rates from its aqueous solutions using adsorption equations. Two laboratory experiments were carried out for the adsorption and release of lead. The adsorption experiment took 0.5 g of some of the above soil minerals. Lead was added as Pb (NO3)2 at levels of 3.0, 2.0, 1.5, 1.0, 0.5, and 0.0 mmol L-1 containing a concentration of 0.01M of calcium chloride. The experimental unit’s number was 72, the concentration of dissolved lead in the equilibrium solution was estimated and the amount of lead adsorbed was calculated. As for the lead release experiment, samples fo
... Show More