A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The aimed of the research was recognize the Big five personality factors and Academic procrastination among Baghdad university students, recognized differences between the gender according to Big five personality factors and Academic procrastination , to recognized differences between specialization (scientific, human), and to recognize the relationship Between the variables of the research, and the extend of contribution Big five personality factors in Academic procrastination , to achieve these aims , Adopt scale to measure the Big five personality factors for (John Danahue & Kentle) , As we as the preparation of scale Based on An amber of previous scales to measure Academic procrastination, After processing the data st
... Show MoreCosmochthonius reticulatus Grandjean, 1947 (Acari: Oribatei: Cosmochthoniidae) and Rhysotritia ardua ardua C. L. Koch, 1841 ( Acari : Oribate : Euphthiracari¬dae), are two species of oribatids mites first recorded in Iraq from a woodland in the central part of Iraq. The two species are described and illustrated.
The new organic reagent 2-[Benzo thiazolyl azo]-4,5-diphenyl imidazole was prepared and used as complexing agent for separation and spectrophotometric determination of Cu2+ ion in some samples include plants, soil, water and human blood serum. Initially determined all factors effect on extraction method and the results show optimum pH was (pHex=9), optimum concentration was 40?g/5mLCu2+ and optimum shaking time was (15min.), as well stoichiometry study appears the complex structure was 1:1 Cu2+: BTADPI. Interferences effect of cations were studied. Synergism effect shows MIBK gave increasing in distribution ratio (D). Organic solvent effect appears there is no any linear relation between dielectric constant for organic solvent used and dis
... Show MoreA new furfural Schiff base derivative ligand (L-FSB) named N-(4- Bromo-2-methylphenyl)-1-(furan-2-yl)methanimine, was synthesized from the condensation reaction of furfural (fur) with 4-Bromo-2- methylaniline (bma) in 1:1molar ratio. A new series of VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II) metal complexes are synthesized according to the metal content analysis in an 2:1 ligand:metal ratio. The stereochemistry of the ligand complexes have been deduced by Fourier Transform-Infra Red (FT-IR), Atomic Adsorption (A.A), Ultra violate-Visible Spectra (UV-Vis Spectra), (Mass Spectra, Proton,13Carbon-Nuclear Magnetic Resonance) (1H-NMR,13CNMR) for ligand), magnetic susceptibility at 25oC and conductivity measurements. Fr
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreWith the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show More
