An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreIn this research, Zinc oxide (ZnO)/epoxy nanocomposite was synthesized by simple casting method with 2wt. % ZnO concentration. The aim of this work was to study the effect of pH and composite dosage on the photocatalytic activity of ZnO/ epoxy nanocomposite. Scanning electron microscopy (SEM) technique images proof the homogeneous distribution of ZnO nanoparticles in epoxy. A synthesized nanocomposite samples were characterized by Fourier Transform Infrared spectrometer (FTIR) measurements. Two spectra for epoxy and 2wt.% ZnO/epoxy nanocomposites were similar and there are no new bonds formed from the incorporation of ZnO nanoparticles. Using HCl and NaOH were added to Methylene blue (MB) dye (5ppm) to gat pH values 3 and 8. The degradat
... Show MoreIn this research, the kinetic studies of four isoenzymes of Asprtate aminotransferase, which partially purified from the urine of chronic renal failure patients were carried out .The four isoenzymes were obeyed Michaelis-Menton's equation and the optimum concentration of their substrate (Aspartic acid) was (166.5x10-3) mole/liter,and their Km values were determined. Four isoenzymesI,II,III,IV have shown an optimum pH at 7.4.The four isoenzymes obeyed Arrhenius equation up to 37º C and their Ea and Q10 constants were determined .
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreRecent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreLet R be a commutative ring with unity .M an R-Module. M is called coprime module (dual notion of prime module) if ann M =ann M/N for every proper submodule N of M In this paper we study coprime modules we give many basic properties of this concept. Also we give many characterization of it under certain of module.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show More