In this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the efficiency of the proposed method that are solved through implementation in MATLAB R2018a.
As tight gas reservoirs (TGRs) become more significant to the future of the gas industry, investigation into the best methods for the evaluation of field performance is critical. While hydraulic fractured well in TRGs are proven to be most viable options for economic recovery of gas, the interpretation of pressure transient or well test data from hydraulic fractured well in TGRs for the accurate estimation of important reservoirs and fracture properties (e.g. fracture length, fracture conductivity, skin and reservoir permeability) is rather very complex and difficult because of the existence of multiple flow profiles/regimes. The flow regimes are complex in TGRs due to the large hydraulic fractures n
An Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreThe irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.
As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i
... Show MoreAbstract
The Purpose of This Research is The Main Factors In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.
In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.
Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe effect of the initial pressure upon the laminar flame speed, for a methane-air mixtures, has been detected paractically, for a wide range of equivalence ratio. In this work, a measurement system is designed in order to measure the laminar flame speed using a constant volume method with a thermocouples technique. The laminar burning velocity is measured, by using the density ratio method. The comparison of the present work results and the previous ones show good agreement between them. This indicates that the measurements and the calculations employed in the present work are successful and precise
In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.