Preferred Language
Articles
/
bsj-877
Orthogonal Functions Solving Linear functional Differential EquationsUsing Chebyshev Polynomial
...Show More Authors

A method for Approximated evaluation of linear functional differential equations is described. where a function approximation as a linear combination of a set of orthogonal basis functions which are chebyshev functions .The coefficients of the approximation are determined by (least square and Galerkin’s) methods. The property of chebyshev polynomials leads to good results , which are demonstrated with examples.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy Procedia
A Coupled Model of the Linear Joule Engine with Embedded Tubular Permanent Magnet Linear Alternator
...Show More Authors

Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Oscillation of Nonlinear Differential Equations with Advanced Arguments
...Show More Authors

This paper is concerned with the oscillation of all solutions of the n-th order delay differential equation . The necessary and sufficient conditions for oscillatory solutions are obtained and other conditions for nonoscillatory solution to converge to zero are established.

View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
International J. Of Math. Sci. & Engg. Appls.
NEUTRAL DELAY DIFFERENTIAL EQUATION WITH ONE LARGE DELAY
...Show More Authors

Publication Date
Sun Aug 03 2014
Journal Name
Journal Of Advances In Mathematics
On types of Delay in Delay Differential equation
...Show More Authors

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Oscillation of Nonlinear First Order Neutral Differential Equations
...Show More Authors

In this paper, the author established some new integral conditions for the oscillation of all solutions of nonlinear first order neutral delay differential equations. Examples are inserted to illustrate the results.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Communications In Computer And Information Science
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref