Preferred Language
Articles
/
bsj-4095
Solving Whitham-Broer-Kaup-Like Equations Numerically by using Hybrid Differential Transform Method and Finite Differences Method
...Show More Authors

This paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Solving Two-Points Singular Boundary Value Problem Using Hermite Interpolation
...Show More Authors

In this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Applying the substance-field model mechanism to problem solving in industrial product design: محمد علي حسين القيسي
...Show More Authors

  Problem solving methods and mechanisms contribute to facilitating human life by providing tools to solve simple and complex daily problems. These mechanisms have been essential tools for professional designers and design students in solving design problems.
This research dealt with one of those mechanisms, which is the (the substance-field model model), as it has been mentioning that this mechanism is characterized by the difficulty of its application, which formed the main research problem. In home gardens (the sub-problem of research), an analysis of this problem was applied and then a solution was found to address it. The researcher used the 3dsmax program to implement the proposed design.
The most important research res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
The Weighted Index Number Method
...Show More Authors

The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Improved Alternating Direction Implicit Method
...Show More Authors
Abstract<p>The alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Upscale Gray Image using Mixing Transform Generation based on Tensor Product
...Show More Authors

The increased size of grayscale images or upscale plays a central role in various fields such as medicine, satellite imagery, and photography. This paper presents a technique for improving upscaling gray images using a new mixing wavelet generation by tensor product. The proposed technique employs a multi-resolution analysis provided by a new mixing wavelet transform algorithm to decompose the input image into different frequency components. After processing, the low-resolution input image is effectively transformed into a higher-resolution representation by adding a zeroes matrix. Discrete wavelets transform (Daubechies wavelet Haar) as a 2D matrix is used but is mixed using tensor product with another wavelet matrix’s size. MATLAB R2021

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Ordinary Method and Robust Method to estimate the Parameters of the Univariate Mixed Model with Low Order
...Show More Authors

A condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.

Simulation study was done for a varieties the model.  using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.

 

View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
اثر طريقة الملاحظات الصفية باستخدام الحاسوب( كمنشطات عقلية) في التحصيل الدراسي لمادة الفيزياء لدى طالبات الصف الأول المتوسط
...Show More Authors

The research aim to know the effect of note–taking by computer method as amentalactivators in achievement of physics subject for the first intermediate class students.

To investigate from aim of the research the research sample was chosen from the first intermediate class students in Al–mutamyzat secondary school for girls. Which belongs to the general administration for the second karkh education which randomly chosen from (9) schools for distinct female students in Baghdad. Then randomly chosen two sections form three about (80) female students at (66.667%) from total sample it’s about (120) female student in the three sections. The randomly chosen too, section (a) to represent experimental group it’s about (41) female

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 02 2026
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF