A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreA new Spectrophotometric method, is for individual and simultaneous determination of Ciprofloxacin hydrochloride(CIP) and Mebeverin hydrochloride(MEB) by the first and second derivative mode techniques. The first and second derivative spectra of these compounds permitted individual and simultaneous determination of CIP and MEB in concentration range of (4-28μg/mL) by measuring the amplitude of peak- to- base line and the area under peak at selected spectrum intervals. The methods showed a reasonable precision and accuracy and have been applied to determine CIP and MEB in four different pharmaceutical preparations.
2-amino-4-(4-chloro phenyl)-1,3-thiazole (1) was synthesized by refluxing thiourea with para-chloro phenacyl bromide in absolute methanol. The condensation of amine compound (1) with phenylisothiocyanate in the presence of pyridine will produce 1-(4-(4-chlorophenyl)thiazol-2-yl)-3-phenylthiourea(2), which is upon treatment with 2,4 dinitrophenyl hydrazine by conventional method, afforded 1- ( 4 - ( 4 – chlorophenyl ) thiazol – 2 – yl ) – 3 - phenylhydrazonamide,N' - ( 2 , 4 -dinitrophenyl) ,(3).The characterization of the titled compounds were performed utilizing FTIR spectroscopy, 1HNMR and CHNS elemental analysis, and by me
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreAutorías: Nuha Mohsin Dhahi, Muhammad Hamza Shihab. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.
The current investigation included study of leaf surface epidermis beside indumentum for the species Galium aparine L., G. ceratopodum Boiss, G. setaceum Lam., G. spurium L., and G. tricornatum Dandy, the study showed that paracytic type of stomatal complex is the only type occur in leaf. The indumentum compose of eglandular hairs vary in their apices, length and occurrence of different part of plant body
كيف بنى الشاعر العربي القديم قصيدته موسيقيا ؟ ولماذا تقوم هذه القصيدة على معمار إيقاعي معين دون غيره ؟ ولماذا صار ذلك البناء سمة لتشكيل ذائقتنا الشعرية وترديد مسارها ـ الذي لا يكاد يشابهه ما لدى الأمم الأخرى ـ حتى عصرنا الراهن هذِا ؟ وما علاقة البناء الموسيقي بالانفعالات الشعورية والنفسية المشتجرة في ذات المبدع ؟