In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
in this paper fourth order kutta method has been used to find the numerical solution for different types of first liner
Health service institutions suffer from challenges resulting from the great changes that our world is witnessing today. This has affected the value that these institutions add to the patient.
This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri
... Show MoreThe current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult
... Show MoreThe aim of this paper is to find out the effects of the strategy of productive thinking upon the student’s achievement for the subject of research methodology in the College of Islamic Sciences. Achieving this objective, the researchers set the null hypotheses: (1) No difference is noticed to be statistically significant at the level of significance (0.05) among the student’s mean scores in the experimental group who were taught by the strategy of productive thinking, and the student’s mean scores in the control group who studied by the traditional method in the achievement test. (2) At level of sig. (0.05), there is no statistically significant difference in the mean of scores of the pre-tests and post ones in the achievement test of
... Show MoreThe aim of this paper is to find out the effects of the strategy of productive thinking upon the student’s achievement for the subject of research methodology in the College of Islamic Sciences. Achieving this objective, the researchers set the null hypotheses: (1) No difference is noticed to be statistically significant at the level of significance (0.05) among the student’s mean scores in the experimental group who were taught by the strategy of productive thinking, and the student’s mean scores in the control group who studied by the traditional method in the achievement test. (2) At level of sig. (0.05), there is no statistically significant difference in the mean of scores of the pre-tests and post ones in the achievement test of
... Show MoreMost available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More