An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
The process of evaluating business processes, complex, repetition of procurement processes, need for raw materials and frequency of demand, which makes dealing with suppliers in the evaluation process, making the need for a process intervention in the process. Lighter on the other hand.
Many Iraqi companies suffer from problems related to suppliers, and cases of administrative and financial corruption are often raised regarding this type of contract and from this reality the necessity of researching this problem and trying to develop some solutions to reduce its impact on the companies' work, by using a method that works according to the standards adopted in Evaluation and selection of the supplier in the
... Show MoreThis study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:
... Show MoreNowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polari
... Show MoreThe aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreAbstract:
Since the railway transport sector is very important in many countries of the world, we have tried through this research to study the production function of this sector and to indicate the level of productivity under which it operates.
It was found through the estimation and analysis of the production function Kub - Duglas that the railway transport sector in Iraq suffers from a decline in the level of productivity, which was reflected in the deterioration of the level of services provided for the transport of passengers and goods. This led to the loss of the sector of importance in supporting the national economy and the reluctance of most passengers an
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreElectrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More