Preferred Language
Articles
/
bsj-1298
Approximate Solution of Delay Differential Equations Using the Collocation Method Based on Bernstien Polynomials???? ???????? ????????? ????????? ????????? ???????? ?????????? ???????? ??? ??????? ???? ?????????
...Show More Authors

In this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (24)
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Improvement of the technique for the solution method of Gauss Seidel
...Show More Authors

In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Block Method for SolvingState-Space Equations of Linear Continuous-Time Control Systems
...Show More Authors

This paper presents a newly developed method with new algorithms to find the numerical solution of nth-order state-space equations (SSE) of linear continuous-time control system by using block method. The algorithms have been written in Matlab language. The state-space equation is the modern representation to the analysis of continuous-time system. It was treated numerically to the single-input-single-output (SISO) systems as well as multiple-input-multiple-output (MIMO) systems by using fourth-order-six-steps block method. We show that it is possible to find the output values of the state-space method using block method. Comparison between the numerical and exact results has been given for some numerical examples for solving different type

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (51)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Physics
Describing the Wavefront Aberrations of the Hexagonal Aperture Using Modified Zernike Polynomials
...Show More Authors

n Segmented Optical Telescope (NGST) with hexagonal segment of spherical primary mirror can provide a 3 arc minutes field of view. Extremely Large Telescopes (ELT) in the 100m dimension would have such unprecedented scientific effectiveness that their construction would constitute a milestone comparable to that of the invention of the telescope itself and provide a truly revolutionary insight into the universe. The scientific case and the conceptual feasibility of giant filled aperture telescopes was our interested. Investigating the requirements of these imply for possible technical options in the case of a 100m telescope. For this telescope the considerable interest is the correction of the optical aberrations for the coming wavefront, th

... Show More
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Multistage and Numerical Discretization Methods for Estimating Parameters in Nonlinear Linear Ordinary Differential Equations Models.
...Show More Authors

Many of the dynamic processes in different sciences are described by models of differential equations. These models explain the change in the behavior of the studied process over time by linking the behavior of the process under study with its derivatives. These models often contain constant and time-varying parameters that vary according to the nature of the process under study in this We will estimate the constant and time-varying parameters in a sequential method in several stages. In the first stage, the state variables and their derivatives are estimated in the method of penalized splines(p- splines) . In the second stage we use pseudo lest square to estimate constant parameters, For the third stage, the rem

... Show More
View Publication Preview PDF
Crossref