In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
The current research contains four chapters. The first topic included the methodological framework that included the problem of research and the need for it, and then the importance of the research, and then the aim of the research, its limits and the definition of terms linguistically, conventionally and procedurally. The second chapter (the theoretical framework) contained two topics, the topic The first is titled: The Outward Vision in Child Theater Performances, while the second topic was titled: Presentation Technology in Child Theater, Chapter Four (Research Procedures), which organized the research community and analyzed its sample, and the fourth chapter contained research results, conclusions and recommendations. The prop
... Show MoreCollapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
Financial funding of a construction firm plays an important role in all aspects of the process development. It has been noted that financial crises have a direct impact on the construction industry. The Iraqi government, whether locally or globally, has faced a severe shortage of financing which has resulted in incomplete projects. Due to the financial crisis that Iraq went through which led to the suspension of many residential complex projects and the difficulty of the use of public financing methods, we researched the private financing (public-private partnership) methods instead of public financing methods in residential complex projects implementation. This study verified the financial problems and the factors that relate to th
... Show MoreThe researchers seek to shed light on the importance of accounting disclosure on social responsibility, and the research aims to provide a theoretical approach to social accounting and its disclosure, identify the concept of sustainable development, highlight the theoretical foundations of sustainable development and employ disclosure of social responsibility towards achieving the goals of sustainable development, and identify the impact of The accounting disclosure on social responsibility in achieving sustainable development goals, and the research problem can be reviewed by asking the following question (Does the accounting disclosure of the social responsibility of economic units contribute to achieving sustainable developmen
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreThis semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More