The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which transmit the memory and hereditary effects to other terms is examined. The theoretical results is applied to a numerical example. The calculated solution has a good agreement with the exact solution.
This work involved the successful synthesis of three new Schiff base complexes, including Ni(II), Mn(II), and Cu(II) complexes. The Schiff base ligand was created by reacting the malonyldihydrazide molecule with naphthaldehyde, and the final step involved reacting the ligand with the corresponding metallic chloride yielding pure target complexes. FTIR, 1 H NMR, 13 C NMR, mass, and UV/Vis spectroscopies were used to comprehensively characterize the produced complexes. These substances have been employed in this study to photo-stabilize polystyrene (PS) and lessen the photo-degradation of its polymeric chains. Several methods, including FTIR, weight loss, viscosity average molecular weight, light and atomic force microscopy, and energy disper
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreThe provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreLower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton whi
... Show MoreThe performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe experiment was carried out in the field of botanical garden belonging to the Department of Biology Sciences, College of Education for Pure Science -Ibn AL-Haitham ,Baghdad University. for the growing season. 2014 -2013 to study the effect of the electromagnetic field which included five different intensities (0,5,10,15,20) MT and three periods of time, namely, (1,2,3) an hour and their interaction on some of the morphological characteristics of the safflower plant . designed experiment by Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- 1-Exposing seeds to diffe
... Show MoreBackground: Removal of bacteria from the pulp system by instrumentation of an infected root canal, will be significantly reduced the number of bacteria, but it is well documented that instrumentation alone can-not clean and kill all bacteria found on the root canal walls. Antibacterial irrigants are needed to kill the remaining microorganisms. The aims of this study was to assess antibacterial effect of titanium tetrafluoride (TiF4) solution and brewing green tea against root canal bacteria and to compare with sodium hypochlorite and normal saline through microbiological and molecular studies. Materials and methods: Microbiological study was carried out to determine the concentration of titanium tetrafluoride and brewing green tea at which
... Show More