Search

Showing total 618 results

Search Constraints

Start Over You searched for: Topic mathematics Remove constraint Topic: mathematics Language arabic Remove constraint Language: arabic
618 results

Search Results

151. Boubaker Wavelets Functions: Properties and Applications

152. New Scale Dai-Yaun Conjugate Gradient Method for Unconstrained Optimization

153. A Globally Convergence Spectral Conjugate Gradient Method for Solving Unconstrained Optimization Problems

154. Nullity and Bounds to the Nullity of Dendrimer Graphs

155. Hiding digital image watermarking in a sound signal using Wavelet Transform and Singular Value Decomposition

156. Using Exponential Finite Difference Method for Solve Kuramoto-Sivashinsky Equation with Numerical Stability Analysis

157. Smarandache Rings and Smarandache Elements

158. The Effect of Inclination into Heat Convection Flow of Dissipative Fluid in a Channel of Porous walls

159. New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model

160. On Maximal Chains In Partially Ordered Sets With Compatible (Left, Right)- Group Actions

161. Using the Genetic Algorithm in Developing a Method for Steganography

162. Stability Analysis of Anonlinear Autoregressive Model of First Order

163. Hybrid Genetic Algorithm with Filters to Image Enhancement

164. On WJCP-Injective Rings

165. On Simple Singular N-Flat Modules

166. Neural Network Using for Extracting Hidden Information in Images

167. New Three –Term CG-Method for Unconstrained Optimization

168. Fourier Stability Analysis of Two Finite Element Schemes for Reaction-Diffusion System with Fast Reversible Reaction

169. Study of Dynamical Properties and Effective of a State u for Hyperchaotic Pan Systems

170. Analysis of Requirements Phase as a Step for Software Engineering Automation

171. Two Modified QN-Algorithms for Solving Unconstrained Optimization Problems

172. The Detour Polynomials of the Corona of Graphs

173. Numerical Solution for Non-linear Boussinesq System Using the Haar Wavelet Method

174. Convergence Analysis of The Finite Difference Solution for Two Dimensions Coupled-Benjamin-Bona-Mahony System

175. On Some Properties of Functions on Convex Galaxies

176. A Series of Saddle - Node Bifurcation and Chaotic Behavior of a Family of a Semi - Triangular Maps

177. Genetic Linear Averaging Algorithm for Zooming Digital Images

178. Classification of Web Pages by Using Particle Swarm Optimization Algorithm

179. n-Hosoya polynomials for Pentagonal Chains

180. Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data

181. Solution of Nonlinear 2nd Order Multi-Point BVP By Semi-Analytic Technique

182. On Completely YJ-injective Rings

183. A Modified Augmented Lagrange Multiplier Method for Non-Linear Programming

185. Design and Implementation of Distributed Real-time Security System via Mobile Technology

186. New Conjugacy Coefficient for Conjugate Gradient Method for Unconstrained Optimization

187. An Application of He's Variational Iteration Method for Solving Duffing - Van Der Pol Equation

188. Study Conditions of Center of Gravity for Trivial Solution to Semi Linear Differantial Equation of Third Order in The One Critical Cases

189. القدرة التنبؤية لمعايير اختبار الثانوية العامة لمنهاج الرياضيات بمستوى النجاح في فلسطين

190. أثر برنامج تدريسي مبني على التقويم الحقيقي في تحصيل طلبة الصف العاشر في مادة الرياضيات

191. On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations

192. Fuzzy-assignment Model by Using Linguistic Variables

193. The Generalized Gamma – Exponentiated Weibull Distribution with its Properties

194. weakly supplement extending modules

195. Supra ω-separation axioms

196. Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data

197. Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices

198. Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System

199. Building a Multi-Period Probability Dynamic Inventory Model with Application

200. Hiding Sensitive Frequent Itemsets over Privacy Preserving Distributed Data