Markov chains are an application of stochastic models in operation research, helping the analysis and optimization of processes with random events and transitions. The method that will be deployed to obtain the transient solution to a Markov chain problem is an important part of this process. The present paper introduces a novel Ordinary Differential Equation (ODE) approach to solve the Markov chain problem. The probability distribution of a continuous-time Markov chain with an infinitesimal generator at a given time is considered, which is a resulting solution of the Chapman-Kolmogorov differential equation. This study presents a one-step second-derivative method with better accuracy in solving the first-order Initial Value Problems (IVPs) compared to other approaches found in the literature, which is verified by the obtained solutions. The determination of the transient solutions for Markov chains is presented using the proposed method. The results show better accuracy in solving the transient distribution in Markov chains, which implies that there is an improved assurance in adopting this approach in future studies of the Markov chain modeling process for predicting future events based on the current state of a process. Future studies on Markov chain modeling could adopt the introduced method to predict future events based on the current state of a process.
The important factor in the success of construction projects is its ability to objective estimate of the cost of the project and adapt to the changes of the external environment, which is affected by a lot of elements and the requirements of the competitive environment. The faces of those projects are several problems in order to achieve particular goals. To overcome these difficulties has been the development of research in the last two decades and turn the focus on the role of the cost of project management, by providing information and assist management in planning and control of the budget among the main elements of the project, namely, (time-cost-quality),The research aims at the possibility of developing and implementing mechanisms
... Show MoreBackground: Helicobacter pylori are important gastrointestinal pathogen associated with gastritis, peptic ulcers, and an increased risk of gastric carcinoma. There are several popular methods for detection of H. pylori (invasive and non-invasive methods) each having its own advantages, disadvantages, and limitations, and by using PCR technique the ability to detect H. pylori in saliva samples offers a potential for an alternative test for detection of this microorganism. Materials and methods: The study sample consists of fifty participants of both genders, who undergo Oesophageo-gastrodudenoscopy at the Gastroenterology Department of Al-Kindy Teaching Hospital Baghdad/ Iraq, during five months period from January 2014 to May 2014. They we
... Show MoreThe current research aims to identify the effect of the note-taking strategy (CORNELL) on systematic thinking among second-grade female students in government daytime secondary and intermediate schools. Al-Fadhila School was intentionally chosen to be its student sample for the research affiliated with the First Karkh Directorate for the academic year (2024-2025). Then one of the two sections was randomly chosen to represent the experimental group that studies according to the note-taking strategy (CORNELL) and the other the control group that studies according to the usual method. The equivalence of the two research groups was verified by a set of variables, which were represented by chronological age in months, previous achievement in che
... Show More
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreThe process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
Abstract
The target derivative are gentamicin linked with L-Val- L-Ala by an ester linkage. These were synthesized by esterification method, which included the reaction of -OH hydroxyl group on (carbon No.5) of gentamicin with the acid chloride of the corresponding dipeptide, The preparation of new derivative of gentamicin involved protected the primary & secondary amine groups of Gentamicin, by Ethylchloroformate (ECF) to give N-carbomethoxy Gentamicin which was used for further chemical synthesis involving the free hydroxyl groups.
Then prepared dipeptide (L-Val- L-Ala) by conventional solution method in present DCC & HoBt then reacted with thionyl
... Show MoreThe synthesis oxadiazole derivative 2,5-disubstituted-1,3,4oxadiazole (3a,3b,3c) was prepared from reaction of N-(4-amino benzene sulphonyl)Morpholipebut-2-enehydrazide with (4-hydroxybenzaldehyde,4-methoxy benzaldehyde,4-ethoxybenzaldehyde) in the presence of lone as catalyst. The structure of (3a,3b,3c) was characterized by using FT-IR, H-NMR and spectroscopy. Nanoparticles of the prepared compounds have been fabricated in aqueous media using re-precipitation method.Characterization of the nano particles (ONPs) have been performed by using UV-VIS spectrophotometer and scanning electron micro scope ( SEM). The size of the nanoparticales were around 150-200 nm as indicated by (SEM). T
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreIn this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 prot
... Show More