Preferred Language
Articles
/
bsj-3389
Numerical Solution of Fractional Volterra-Fredholm Integro-Differential Equation Using Lagrange Polynomials
...Show More Authors

In this study, a new technique is considered for solving linear fractional Volterra-Fredholm integro-differential equations (LFVFIDE's) with fractional derivative qualified in the Caputo sense. The method is established in three types of Lagrange polynomials (LP’s), Original Lagrange polynomial (OLP), Barycentric Lagrange polynomial (BLP), and Modified Lagrange polynomial (MLP). General Algorithm is suggested and examples are included to get the best effectiveness, and implementation of these types. Also, as special case fractional differential equation is taken to evaluate the validity of the proposed method. Finally, a comparison between the proposed method and other methods are taken to present the effectiveness of the proposal method in solving these problems.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE INFLUENCE OF SUPPLEMENTING ELLAGIC ACID TO BROILER DIETS ON PRODUCTIVITY AND WHITE BLOOD CELL DIFFERENTIAL COUNTS: THE INFLUENCE OF SUPPLEMENTING ELLAGIC ACID TO BROILER DIETS ON PRODUCTIVITY AND WHITE BLOOD CELL DIFFERENTIAL COUNTS
...Show More Authors

This study has been carried out in the animal field of the college of agricultural engineering sciences, university of Baghdad, for the period from 12/15/2021 to 1/26 /2022 for 42 d, to investigate the effect of adding different levels of ellagic acid to the diet of broilers, on some physiological characteristics &  oxidation indicators in meat compared to vitamin C in meat,  225 Ross 308 chicks were used, divided randomly to five treatments such us: T1: control group without additives to diet, &  the other T2, T3, T4 was added  ellagic  acid (

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
إيجاد الحل المقبول (الممكن) والأمثل لأنموذج البرمجة الخطية في ظل عدم تحقق شرطّي الإمكانية والأمثلية
...Show More Authors

تعد البرمجة الخطية عاملاً مؤثراً وفعالاً في عملية صنع و إتخاذ القرار عندما تكون الموارد متاحة أو متوفرة لكي تعطي أهدافاً معينة ، وتكمن البرمجة الخطية في حل وتقييم الانشطة أو الفعاليات عند تطبيق إحدى أدواتها وهي الطريقة المبسطة العامة ، التي يكون فيها الحل مقبولاً (ممكناً) ويجب التوصل الى الحل الامثل عندها تسمى بالطريقة المبسطة الاولية أو يكون الحل فيها أمثلاً ويجب التوصل الى الحل الم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Study the Nuclear Structure of Some Even-Even Ca Isotopes Using the Microscopic Theory
...Show More Authors

The root-mean square-radius of proton, neutron, matter and charge radii, energy level, inelastic longitudinal form factors, reduced transition probability from the ground state to first-excited 2+ state of even-even isotopes, quadrupole moments, quadrupole deformation parameter, and the occupation numbers for some calcium isotopes for A=42,44,46,48,50 are computed using fp-model space and FPBM interaction. 40Ca nucleus is regarded as the inert core for all isotopes under this model space with valence nucleons are moving throughout the fp-shell model space involving 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. Model space is used to present calculations using FPBM intera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Numerical Study Of Heat Transfer In Cooling Passages Of Turbine Blade
...Show More Authors

As the temperature of combustion gases is higher than the melting temperature of the turbine materials, cooling of turbine parts in a gas turbine engine is necessary for safe operation. Cooling methods investigated in this computational study included cooling flow losses. Film-cooling is one typically used cooling method whereby coolant is supplied through holes passage, in present study the holes placed along the camber line of the blade. The subject of this paper is to evaluate the heat transfer that occur on the holes of blade through different
blowing coolant rates. The cases of this study were performed in a low speed wind tunnel with two tip gap at small and large (0.03 and 0.09cm) and multiple coolant flow rates through the fil

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A PARTICULAR SOLUTION OF THE TWO AND THREE DIMENSIONAL TRANSIENT DIFFUSION EQUATIONS
...Show More Authors

A particular solution of the two and three dimensional unsteady state thermal or mass diffusion equation is obtained by introducing a combination of variables of the form,
η = (x+y) / √ct , and η = (x+y+z) / √ct, for two and three dimensional equations
respectively. And the corresponding solutions are,
θ (t,x,y) = θ0 erfc (x+y)/√8ct and θ( t,x,y,z) =θ0 erfc (x+y+z/√12ct)

View Publication Preview PDF