In this paper, we present new algorithm for the solution of the nonlinear high order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series solution that converges very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of multi- point boundary value problems.
The BEK family of flows have many important practical applications such as centrifugal pumps, steam turbines, turbo-machinery and rotor-stator devices. The Bödewadt, Ekman and von Kármán flows are particular cases within this family. The convective instability of the BEK family of rotating boundary-layer flows has been considered for generalised Newtonian fluids, power-law and Carreau fluids. A linear stability analysis is conducted using a Chebyshev collocation method in order to investigate the effect of shear-thinning and shear-thickening fluids for generalised Newtonian fluids on the convective Type I (inviscid crossflow) and Type II (viscous streamline curvature) modes of instability. The results reveal that shear-thinning power-law
... Show MoreHigh performance self-consolidating concrete HP-SCC is one of the most complex types of concrete which have the capacity to consolidated under its own weight, have excellent homogeneity and high durability. This study aims to focus on the possibility of using industrial by-products like Silica fumes SF in the preparation of HP-SCC enhanced with discrete steel fibers (DSF) and monofilament polypropylene fibers (PPF). From experimental results, it was found that using DSF with volume fraction of 0.50 %; a highly improvements were gained in the mechanical properties of HP-SCC. The compressive strength, splitting tensile strength, flexural strength and elastic modulus improved about 65.7 %, 70.5 %, 41.7 % and 80.3 % at 28 days age, respectively
... Show MoreThis study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe aim of this paper is to estimate a nonlinear regression function of the Export of the crude oil Saudi (in Million Barrels) as a function of the number of discovered fields.
Through studying the behavior of the data we show that its behavior was not followed a linear pattern or can put it in a known form so far there was no possibility to see a general trend resulting from such exports.
We use different nonlinear estimators to estimate a regression function, Local linear estimator, Semi-parametric as well as an artificial neural network estimator (ANN).
The results proved that the (ANN) estimator is the best nonlinear estimator am
... Show MoreThe method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta method (RK4), which gives very
... Show More