An efficient combination of Adomian Decomposition iterative technique coupled with Laplace transformation to solve non-linear Random Integro differential equation (NRIDE) is introduced in a novel way to get an accurate analytical solution. This technique is an elegant combination of theLaplace transform, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (LTADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions and consecutive error are presented. Two applications are presented as examples of how the proposed technique can be utilised to obtain analytical or numerical solutions for certain kinds of Random Integro Differential Equations (RIDEs) in order to demonstrate its efficacy and potential.
In this research Bi2S3 thin films have been prepared on glass substrates using chemical spray pyrolysis method at substrate temperature (300oC) and molarity (0.015) mol. Structural and optical properties of the thin films above have been studied; XRD analysis demonstrated that the Bi2S3 films are polycrystalline with (031) orientation and with Orthorhombic structure. The optical properties were studied using the spectral of the absorbance and transmission of films in wavelength ranging (300-1100) nm. The study showed that the films have high transmission within the range of the visible spectrum. Also absorption coefficient, extinction coefficient and the optical energy gap (Eg) was calculated, found that the film have direct ener
... Show More
The current research aims to test the relationship of the impact of sustainable leadership as an independent variable in organizational happiness as a dependent variable, in the departments and divisions of the Tourism Authority, to come up with a set of recommendations that contribute to raising the level of organizational happiness in the authority. And based on the importance of the research topic in the General Authority, and the prominent role that this body plays in society, the researcher adopted the descriptive and analytical approach in carrying out this research, by collecting data from the departments and divisions staff of (160) respondents in an exclusively comprehensive
... Show Morebased search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll .
And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi
... Show MoreAn analytical and clinical study has been applied for measure the bioavailability of Zinc in serum of twenty adults healthy volunteers, using flame atomic absorption spectrophotometer (FAAS) at 213.9 nm. The calibration graph is linear in the ranges of 0.25-1.5 μg.mL-1 with correlation coefficient (R) 0.09996)μg.mL1-and molar absorpitivites 22957.76(L.mol1-cm-1.The concentration of Zinc determined in serum of all volunteers before and after administered orally a tablet of 50 mg zinc sulphate, produced by Samara drugs company (SDI). All data were subjected to statistical analysis by calculating accuracy, precision in addition to other parameters. The results indicate that the average maximum concentration (C-max ± SD) of blood zinc was 0.
... Show MoreThe research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,