A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Background: Mouthwashes used widely as ancillary to mechanical oral hygiene methods. Little information provided about the effect of mouthwashes on ions released from orthodontic brackets. Therefore, the present study has been established to evaluate the effect of different mouthwashes on the corrosion resistance and the biocompatibility of two brands of brackets. Materials and Methods: Eighty premolar stainless steel brackets were used (40 brackets from each brand). They were subdivided into four subgroups (n=10) according to immersion media (deionized distilled water, Corsodyl, Listerine and Silca herb mouthwashes). Each bracket was stored in a closely packed glass tube filled with 15ml of the immersion media and incubated for 45 days at
... Show Moreيعد التقويم مبدأ مهماً في العملية التعليمية لأنه يساعد في التعرف على الاختلاف بين ما ينبغي تحقيقة وما تحقق فعلاً وما يترتب على ذلك من توصيات لدعم ما تحقق فعلاً (الأهداف التربوية) وتصحيح مسار العملية التعليمية من خلال المقترحات لتلافي السلبيات التي عثرت تحقيق الأهداف الأخرى وبما أن المحتوى هو أحد عناصر المنهج المهمة وهو وسيلة المعلم في أيصال المعلومات وبقائها في ذهن المتعلم أطول فترة ممكنه من خلال تبسيط المفا
... Show More Type 1 Diabetes melittus ( T1DM ) is Considered as one of the
complicated and chronic disease that affects the dietary patterns for diabetic
child and his normal growth . for this reason , this study aimed to find the
relationship between nutrient needs , the type of feeding for the diabetic child
and his physical growth ( weight and height ) .
The study includes 50 diabetic children , (28) females and (22) males who
came to the National Diabetes Center – AL-mustansiriya University for making
term tests during the period from April 2009 to January 2010 .Their ages
ranged from 3 to13 years ,personal information were collected by a
questionnaire , weight and height were recorded and blood sample were
t
In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show More