This manuscript presents several applications for solving special kinds of ordinary and partial differential equations using iteration methods such as Adomian decomposition method (ADM), Variation iterative method (VIM) and Taylor series method. These methods can be applied as well as to solve nonperturbed problems and 3rd order parabolic PDEs with variable coefficient. Moreover, we compare the results using ADM, VIM and Taylor series method. These methods are a commination of the two initial conditions.
The research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreThe efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi
The monogenean Gyrodactylus bychowskianus Bogolepova, 1950 is recorded in the present study for the first time in Iraq from the gills of the cyprinid fish Arabibarbus grypus (Heckel, 1843); which was collected from the Tigris River at Al-Taji Beach north of Baghdad Province during the period from July until November 2018.
Abstract Lateral Epicondylitis (LE) which has been referred to as the Tennis Elbow as well is a lesion affecting common tendinous origins of wrist extensors due to chronic overuse injury that results in damaging common extensor tendons which join forearm extensor muscles to humerus. The aim of the present evidence-based clinical statement is reviewing scientific evidences for efficacy of a variety of the rehabilitation methods, chronic lateral epicondylitis management. It is focused upon treating chronic lateral epicondylitis and the latest developments in physiotherapy area for managing chronic lateral epicondylitis. Due to the fact that primary physical impairments in the LE are decreased is the strength of the grip, fundamentally due to
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators