The method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta method (RK4), which gives very good agreement. In addition, the convergence of the proposed approximate methods is given based on one of the Banach fixed point theorem results.
This mini review provides an overview of methods for manufacturing expanded graphite (EGT) and the use of its composites with metal oxides in the field of photodegradation of dyes. Dyes from textile manufacturing represent a significant environmental pollution problem in waterways worldwide, highlighting the need for environmentally friendly and efficient technologies to remove dyes from industrial and local wastewater. Photodegradation technologies offer a low-cost, sustainable solution with minimal secondary pollution. Carbon-based materials, such as expanded graphite, are advantageous in enhancing catalytic activity. Accordingly, this review will explore the different fabrication techniques of expanded graphite and summarize the recent d
... Show MoreBanks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t
... Show MoreIt's challenging to help EFL students in Iraq learn and use synonyms. This study investigates the challenges faced by Iraqi English as a Foreign Language (EFL) students in understanding and employing synonyms. By employing Langacker's cognitive linguistic theory of domains, the research aims to enhance EFL Iraqi students' synonym knowledge and vocabulary acquisition. The study utilizes a descriptive analysis technique, with a pre-test and post-test design, involving fifty first-year students at the University of Baghdad's College of Languages, Department of English. The findings reveal that the domain theory significantly improved students' comprehension and application of English word semantics. Prior to the intervention, students
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreThis study aimed to compare the safety and efficacy of laser lithotripsy and pneumatic lithotripsy, the two most commonly used transurethral lithotripsy methods for treating bladder stones in children in Iraq. Between January 2013 and December 2016, 64 children with bladder stones were included in this prospective randomized study, after ethical committee approval and written consent from the children’s parents or caregivers were obtained. Patients were assigned randomly by computer software to two groups treated with either pneumatic cystolithotripsy or laser lithotripsy. A 9 Fr. semirigid ureteroscope was used to pass the lithotripter through and fragment the stone. A catheter of 8–12 Fr. was then introduced and kept in place
... Show MoreVerbs are an important material in the construction of the sentence, as they are among the requirements of every sophisticated language, and in this regard, Ibn Al-Gothic (d. 367 AH): “Know that verbs are the origins of the buildings of most speech, and thus scholars called them buildings.” Verbs are the source of expression of the speakers’ ideas to represent the element of activity and movement, and with their knowledge We infer the meanings of Arabic words, and Ibn Al-Sarraj (d. 316 AH) defined it: “The verb denotes a meaning and a time, and that time is either past, present, or future.” Its letters are original and does not drop from its construction a letter in the conjugation of its conjugations, and it is in Arabic two type
... Show MoreAbstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between th
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More