The aim of this paper is to propose a reliable iterative method for resolving many types of Volterra - Fredholm Integro - Differential Equations of the second kind with initial conditions. The series solutions of the problems under consideration are obtained by means of the iterative method. Four various problems are resolved with high accuracy to make evident the enforcement of the iterative method on such type of integro differential equations. Results were compared with the exact solution which exhibits that this technique was compatible with the right solutions, simple, effective and easy for solving such problems. To evaluate the results in an iterative process the MATLAB is used as a math program for the calculations.
Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreIn this work, studying the effect of ethylenediamine as a corrosion inhibitor was investigated for carbon steel in aerated HCl solution in range of 0.1-1N under dynamic conditions, i.e., rotational velocity of 400–1200 rpm in the temperature range 35 – 65 ºC. Weight loss method was employed in absence and presence of the inhibitor as an adsorption type in concentration range 1000 – 5000 ppm using rotating cylinder specimens. The experimental results showed that corrosion rate in absence and presence of inhibitor is increased with increasing temperature, rotational velocity and concentration of acid. It is decreased with increasing inhibitor concentration for the whole range of temperature, rotational velocity and concentrati
... Show MoreIn this work semi–empirical method (PM3) calculations are carried out by (MOPAC) computational packages have been employed to calculate the molecular orbital's energies for some organic pollutants. The long– chain quaternary ammonium cations called Iraqi Clays (Bentonite – modified) are used to remove these organic pollutants from water, by adding a small cationic surfactant so as to result in floes which are agglomerates of organobentonite to remove organic pollutants. This calculation which suggests the best surface active material, can be used to modify the adsorption efficiency of aniline , phenol, phenol deriviatives, Tri methyl glycine, ester and pecticides , on Iraqi Clay (bentonite) by comparing the theoretical results w
... Show MoreMixed Kirkuk and Sharki-Baghdad crude oils were distilled into narrow fractions. The range of these narrow fractions were 10oC, starting from IBP to 350oC. The total distillates from mixed Kirkuk and Sharki-Baghdad crude oils were 58.25 vol % and 44.65 vol %, respectively.The hydrocarbons compositions (paraffin, naphthene, aromatic) in light fractions starting from IBP to 250oC were determined by using PONA analysis method. The results show that the paraffin content decreases with increasing mid percent boiling point of the fraction, while the naphthene, and aromatic increase with the increase of mid percent boiling point of mixed Kirkuk and Sharki-Baghdad crude oils. Three groups of empirical equations were developed for the prediction
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of
... Show MoreIn this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d
... Show MoreBackground: The antimicrobial resistance is one of the most serious and expanding health problems world -wide in the last decades. The esbl escherichia coli. (extended – spectrum beta-lactamase e.coli) represents an important aspect of it .Objectives: To get an overview on the esbl e.coli prevalence profile in general. Also to assess the antibiotic sensitivity of esbl e. coli trying to specify the most effective antibiotics in combating this micro-organism.Methods: this study tries to focus on this problem in Iraq which through a prospective study approach by taking 35 clinical samples from various sources (urine, blood, abscess, eye ,vagina ,stool and others),and after confirming the presence of e.coli, the presence of esbl e.coli and
... Show MoreAbstract
Theoretical and experimental methodologies were assessed to test curved beam made of layered composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show More