An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (ETADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions are presented.
A novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe purpose of this paper is to identifying the level of analytical thinking and its relationship to the skills of response and simple response to the foil weapon for students of the College of Physical Education and Sports Sciences, University of Basra. Achieving the objectives of the research requires the use of a research method, and accordingly, the researchers used the descriptive method using the survey method .The two researchers identified the research community with the students of the third stage - College of Physical Education and Sports Sciences / University of Basra / for the academic year (2021-2022). Their number is (45) students and the two researchers chose the entire research community to represent th
... Show MoreThe objective of this study is to determine the sources of growth of the cement industry in Iraq for the period 1990-2014 and to indicate the nature of the technological progress used in it. To achieve this objective we have built an econometric model, by adapting the production function constant elasticity for substitution, using multiple regression, and enforcement, SPSS program, and using the ordinary least squares method (OLS). The results showed that quantitative factors (labour and capital) are the main sources of growth the cement industry in Iraq, and the qualitative factors (technological progress) did not contribute effectively to achieve this growth. And that the production techniques adopted in the cement industry in
... Show More|
The study aimed to identify what (isis) (Daesh) have been touched in the opening article of Al-Nabaa newspaper This objective is organized for asset of sub-targets it is the knowledge of media discourse and for those who are directed and methods of employing the strong content debt organization and we used the survay method to monitor and understand the content of opening anticale and the researcher took the numbers of the newspaper for years 2015-2018 consist of 157 The results of this study are :
* Use religious texts from (Holly qoran) (Abbreission of the prophetic) Remove from its context and empby them in justifying in what use of vio |
Based on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo
... Show MoreThe aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More