Preferred Language
Articles
/
bsj-3427
Solving Linear Volterra – Fredholm Integral Equation of the Second Type Using Linear Programming Method
...Show More Authors

In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree  and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods is produced. Finally, for more explanation, an algorithm is proposed and applied for testing examples to illustrate the effectiveness of the new technique.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Applied And Computational Mathematics
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

In this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Civil Engineering Journal
The Suitability of Bailey Method for Design of Local Asphalt Concrete Mixture
...Show More Authors

The study investigated the behaviour of asphalt concrete mixes for aggregate gradations, according to the Iraqi specification using the Bailey method designed by an Excel spreadsheet. In mixing aggregates with varying gradations (coarse and fine aggregate), The Bailey method is a systematic methodology that offers aggregate interlocking as the backbone of the framework and a controlled gradation to complete the blends. Six types of gradation are used according to the bailey method considered in this study. Two-course prepared Asphalt Concrete Wearing and Asphalt Concrete binder, the Nominal Maximum Aggregate Sizes (NMAS) of the mixtures are 19 and 12.5 mm, respectively. The total number of specimens was 240 for both layers (15 samp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 05 2008
Journal Name
Journal Of Kerbala University
Synthesis of New type of tetrazoles starting from D-ribose
...Show More Authors

This work includes synthesis of sugar tetrazole derivative, D-ribose reacted with acetone in the presence of sulfuric acid H2SO4 to give 2, 3-O-isopropylidene-D-ribose (1). The Aldol condensation of (1) with formaldehyde in methanolic K2CO3 solution gave 2-hydroxymethyl (2, 3-O-isopropylidene-D-ribose)(2). Which was tosylated by Tosyl chloride in pyridine to yield compound (3), SN2 reaction of (3) with sodium cyanide in DMSO afforded compound (4). The [2+ 3] cycloaddition reaction of (4) with sodium azide gave the targeted compound (5). All prepared compounds have been characterized by: TLC, Specific rotation, Microelemental analysis and [FTIR and 1 H NMR spectroscopy]

Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of etchant type and the use of silane on the shear bond strength of composite resin to porcelain
...Show More Authors

Background: This study was formulated to compare the effect of 5%hydrofluoric acid in comparison to 37%phosphoric acid with and without the application of silane on bond strength of composite to porcelain. Materials and Methods: Specimen preparation was divided in to two phases, metal-disks fabrication (8mm-diameter and 4mm-thickness) and ceramic veneering. Thirty two specimens were prepared, sandblasted with 50 μm aluminum oxide, and divided into four groups of eight samples. Groups I and III were etched with 37%phosphoric acid while groups II and IV were etched with 5%hydrofluoric acid; and groups I and II were silaneted while groups III and IV were not. Heliobond, and resin composite were applied to each specimen using a plastic transpa

... Show More
Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Physics
Detection of Physical and Chemical Parameters Using Water Indices (NDWI, MNDWI, NDMI, WRI, and AWEI) for Al-Abbasia River in Al-Najaf Al-Ashraf Governorate Using Remote Sensing and Geographic Information System (GIS) Techniques
...Show More Authors

The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Future of Mathematical Modelling: A Review of COVID-19 Infected Cases Using S-I-R Model
...Show More Authors

The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Some Game via Ἷ-Semi-g-Separation Axioms
...Show More Authors

The research demonstrates new species of the games by applying separation axioms via  sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via  sets have been studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref