In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using 
Geotechnical characterization of the sites has been investigated with the collection of borehole data from different sources. Using the data, grain size distribution curves have been developed to understand the particle size distribution of the alluvium present. These curves were further used for preliminary assessment of liquefiable areas. From geotechnical characterization, it has been observed that the soil profile in the two sites is dominated by sand and silty sand.Seed and Idriss (1971) approachhas been usedevaluatethe liquefaction potentialbydeterminationof the relation between the maximum ground acceleration (a max/g) valuesdue to an earthquake and the relative density of a sand deposit in the field. The results reveal that
... Show MoreThe aim of this paper is to find out the effects of the strategy of productive thinking upon the student’s achievement for the subject of research methodology in the College of Islamic Sciences. Achieving this objective, the researchers set the null hypotheses: (1) No difference is noticed to be statistically significant at the level of significance (0.05) among the student’s mean scores in the experimental group who were taught by the strategy of productive thinking, and the student’s mean scores in the control group who studied by the traditional method in the achievement test. (2) At level of sig. (0.05), there is no statistically significant difference in the mean of scores of the pre-tests and post ones in the achievement test of
... Show MoreThe aim of this paper is to find out the effects of the strategy of productive thinking upon the student’s achievement for the subject of research methodology in the College of Islamic Sciences. Achieving this objective, the researchers set the null hypotheses: (1) No difference is noticed to be statistically significant at the level of significance (0.05) among the student’s mean scores in the experimental group who were taught by the strategy of productive thinking, and the student’s mean scores in the control group who studied by the traditional method in the achievement test. (2) At level of sig. (0.05), there is no statistically significant difference in the mean of scores of the pre-tests and post ones in the achievement test of
... Show Morein this paper fourth order kutta method has been used to find the numerical solution for different types of first liner
Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreMost available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAll-optical canonical logic units at 40 Gb/s using bidirectional four-wave mixing (FWM) in highly nonlinear fiber are proposed and experimentally demonstrated. Clear temporal waveforms and correct pattern streams are successfully observed in the experiment. This scheme can reduce the amount of nonlinear devices and enlarge the computing capacity compared with general ones. The numerical simulations are made to analyze the relationship between the FWM efficiency and the position of two interactional signals. © 2015 Chinese Laser Press
 
        