The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which transmit the memory and hereditary effects to other terms is examined. The theoretical results is applied to a numerical example. The calculated solution has a good agreement with the exact solution.
Monetary policy is an important part of the economic policy to influence the monetary aspect of stabilization, for this reason the research will seek to clarify the extent of the impact of monetary policy in achieving monetary stability in Iraq during the chosen research period, because the Iraqi economy suffers from monetary instability due to political and security turmoil, Therefore, an effective and effective monetary policy is required in terms of reducing inflationary pressures to reach the required monetary stability, in order to create the appropriate monetary environment for the work of the economic and productive sectors. Thus, the research adopted a basic hypothesis that monetary policy in Iraq has a clear impact on achieving mon
... Show MoreAbstract:
The paper aims to measure an aggregated banking stability index reflecting the degree of stability of the banking system to help policy makers to take the necessary actions to avoid financial crises facing banks and to achieve a banking system with high efficiency in terms of banking risk.
Therefore, the problem of paper is that the Central Bank of Iraq did not seek until 2016 to build a aggregated index for the purpose of identifying the stability of the banking situation in Iraq, but rather on the adoption of scattered indicators, which depend on the mechanism of relative changes in those indicators for the purpose of identifying the situation of b
... Show MoreThe current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud
... Show MoreGlobal Navigation Satellite Systems (GNSS) have become an integral part of wide range of applications. One of these applications of GNSS is implementation of the cellular phone to locate the position of users and this technology has been employed in social media applications. Moreover, GNSS have been effectively employed in transportation, GIS, mobile satellite communications, and etc. On the other hand, the geomatics sciences use the GNSS for many practical and scientific applications such as surveying and mapping and monitoring, etc.
In this study, the GNSS raw data of ISER CORS, which is located in the North of Iraq, are processed and analyzed to build up coordinate time series for the purpose of detection the
... Show MoreThis paper is devoted to an inverse problem of determining discontinuous space-wise dependent heat source in a linear parabolic equation from the measurements at the final moment. In the existing literature, a considerably accurate solution to the inverse problems with an unknown space-wise dependent heat source is impossible without introducing any type of regularization method but here we have to determine the unknown discontinuous space-wise dependent heat source accurately using the Haar wavelet collocation method (HWCM) without applying the regularization technique. This HWCM is based on finite-difference and Haar wavelets approximation to the inverse problem. In contrast to othe
Abstract
Due to the momentum of winning in the streets of the city of Baghdad as a result of the large number of checkpoints so felt researcher to conduct a field visit to find out the main reasons that led to this congestion and to find practical solutions to mitigate wastage winning the arrival time citizen to where you want the least possible time.
This research aims to overcome the difficulties experienced by citizens to reach their places of work and reduce waste at the time of service and waiting time as well as reduce the cost of waiting.
Has emerged study a set of conclusions, including the use of model queue (G / G / C) and the mome
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More