The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimizing the degree of error between approximate and exact solutions. The Wang-Ball series has shown its usefulness in solving any real-life scenario model as first- or second-order differential equations (DEs).
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThis research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consiste
... Show MoreABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show MoreThis paper examines the use of one of the most common linguistic devices which is hyperbole. It shows how hyperbolic devices are used as an aspect of exaggeration or overstatement for an extra effect in which the speaker can use hyperbole to add something extra to a situation in order to exaggerate his idea or speech. It is, like other figures of speech, used to express a negative or positive attitude of a specific unit of language. Thus, this paper is set against a background of using hyperbole concerning two main fields (advertisements and propaganda). So, the use of hyperbole will be implied by analyzing them concerning their meaning) literal and non-literal). Methodology of this
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect
... Show MoreBackground: The immune system of the oral cavity suffers alterations due to fixed orthodontic treatment which act as potent stimulus for oral secretory immunity. The aims of this study are to estimate the effect of fixed orthodontic appliance on the level of salivary sIgA at different time intervals, and to verify the gender difference. Materials and method: The patient's history, clinical examination, and fixed orthodontic appliances were placed for 30 Iraqi orthodontic adult patients had class II division 1 and/ or class I malocclusion (15 males and 15 females) aged 18-25 years old. The unstimulated whole saliva was collected from each sample immediately before wearing fixed appliance (control group T0 as base line), and after 2 weeks (T1
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAcne vulgaris is a very common, chronic disorder, involving inflammation of the pilosebaceous units that can be varied in presentation and difficult to treat. Inflammatory acne may yield both scarring and pigmentary changes so early and adequate therapy will, in all cases, decrease its severity and may entirely suppress this disease. Serratiopeptidase has anti-inflammatory, anti-edemic and fibrinolytic activity and acts rapidly on localized inflammation. Serratiopeptidase was added in aim to hasten acne resolution. During March to July 2010, A comparative study for a 50 healthy patient suffering from acne was divided into 2 groups: 1st group treated by common acne modalities and the 2nd one with same modalities
... Show MoreNowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e
... Show More