Research Summary
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of the prophets and messengers, our master Muhammad, and on the good God and his righteous companions.
For the most truthful hadith is the Book of God Almighty, and the best guidance is the guidance of the Prophet, may God bless him and grant him peace. If any)). Our good predecessor took care of collecting what they were able to collect and arrange from the words of the prophecy issued by our master Muhammad, peace and blessings be upon him, and wrote works on them including forms of support, parts, dictionaries, and mosques. About me, if any, in order to re
In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i
... Show MoreThe various properties of the ground and excited electronic states of coumarins 102 using density functional theory (DFT) and time-dependent density functional theory (TDDFT) was calculated by the B3LYP density functional model with 6-31G(d,p) basis set by Gaussian 09 W program. Spectral characteristics of coumarin102 have been probed into by methods of experimental UV-visible, and quantum chemistry. The UV spectrum was measured in methanol. The optimized structures, total energies, electronic states (HOMO- LUMO), energy gap, ionization potentials, electron affinities, chemical potential, global hardness, softness, global electrophilictity, and dipole moment were measured. We find good agreement between experimental data of UV spectrum and
... Show MoreA total of 680 fish specimens belonging to 31 species from the Yemeni coastal waters of the Red Sea were inspected for the isopod infestations. Four isopod species belonging to three families of the suborder Cymothoida were detected. These are: Aega psora (Linnaeus, 1758) from Lethrinus lentjan, Natatolana insignis Hobbins and Jones, 1993 from Abalistes stellatus, Excorallana tricornis (Hansen, 1890) from Epinephelus fuscoguttatus, E. guttatus and E. tauvina and Alcirona krebsi Hansen, 1890 from Epinephelus microdon. All these isopod species are reported here for the first time from the Yemeni coastal waters of the Red Se
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specim
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More