The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimizing the degree of error between approximate and exact solutions. The Wang-Ball series has shown its usefulness in solving any real-life scenario model as first- or second-order differential equations (DEs).
تناول البحث حل مشكلة النقل باستخدام مدخل بحوث العملٌات فً مرحلة التحلٌل والتصمٌم لنموذج المشكلة , وتم مقارنة النتائج التً حصلنا علٌها من الحلول لصٌاؼة التحلٌل وبرهنة صحة النموذج المتجه صوب الموضوع, وتم اجراء المقارنة بٌن الحلول المختلفة الختٌار اقل قٌمة لدالة الهدؾ لكً ٌتمكن المستفٌد من صنع القرار, باستخدام الطرق االربعة )طرٌقة الزاوٌة الشمالٌة الؽربٌة, طرٌقة اقل التكالٌؾ, طرٌقة فوجل التقرٌبٌة, الطرٌقة ال
... Show MoreSports marketing is one of the most important areas to attract capital and the most important economic activities at the present time and the sports field is one of the most important areas that can be used in marketing products and services and the need for sports marketing in Iraq is shown to increase the benefits and returns of sports clubs due to a lack of material resource and weakness In the available capabilities presented to it. The research problem was the lack of sufficient knowledge of the role of sports marketing in the value of the customer by members of the administrative body of Iraqi sports clubs. The research aims to know the role of sports marketing in the value of the customer in the Iraqi Premier League clubs.
... Show MoreIt is uncertain whether terminal ileum intubation should be performed routinely during colonoscopy, as there is uncertainty regarding its diagnostic value. The aim of the present study is to assess the diagnostic yield of terminal ileum intubation during colonoscopy according to indications for colonoscopy. This is a cross-sectional study in which the results of 294 total colonoscopy procedures were reviewed; ileal intubation was performed in 269 (91.49%) patients. The indications for colonoscopy, the results of ileoscopy, and the histopathological results of ileal biopsies were evaluated.
A total of 54 (20%) out of 269 patients who had successful intubation into the terminal ileum sh
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreAdolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
The researcher [1-10] proposed a method for computing the numerical solution to quasi-linear parabolic p.d.e.s using a Chebyshev method. The purpose of this paper is to extend the method to problems with mixed boundary conditions. An error analysis for the linear problem is given and a global element Chebyshev method is described. A comparison of various chebyshev methods is made by applying them to two-point eigenproblems. It is shown by analysis and numerical examples that the approach used to derive the generalized Chebyshev method is comparable, in terms of the accuracy obtained, with existing Chebyshev methods.
إن اختلاف الفقهاء مصدر عظيم لثروة فقهية كبيرة، ومن مظاهر الخلاف الفقهي مؤاخذات علمية يوردها بعض العلماء على علماء آخرين بدعوى مخالفتهم الأدلة الشرعية، أو القواعد المقررة لاستنباط الأحكام الشرعية، ومن تلك المؤاخذات ما أورده الإمام المحدث أبو بكر ابن أبي شيبة رحمه الله تعالى على أبي حنيفة النعمان رحمه الله حيث إنه ساق في مصنفه الكثير من الأحاديث والآثار التي عد الإمام أبا حنيفة رحمه الله مخالفا لما تقتضيه من
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show More