Now showing items 1-20 of 24

• #### Numerical Methods for Solving Elliptic Boundary -Value Problems ﻿

(2005)
Elliptic Partial Differential Equations of second order have been studied using some numerical methods. This type of differential equations has specific applications in physical and engineering models. In most applications, ...
• #### Analysis of The Logistic Distribution Use in The Suppression Technique for Scalability in Multicast Routing ﻿

(2007)
The immense growth of the computer-supported communication systems, especially the internet, made it imperative to design protocols that have to be efficient and scalable to support the work of the networks infrastructure. ...
• #### Cost Value Function Of Water Distribution Networks A Reliability-Based Approach Using Matlab ﻿

(2008)
Every community on Earth ought to find the appropriate means to distribute water from different sources to a consumption centers. In general, water distribution networks (WDN) attain this. Each network is composed of arches ...
• #### Closeness Centrality and Epidemic Spreading in Networks ﻿

(2008)
This thesis is about the relation between the closeness centrality of the first infected node in the network and each of the total infection time that needs to infect all nodes in that network ,the infection rate for ...
• #### Simulation in Queuing Models: Using Simulation at Beit-Eba Crossing Check-Point ﻿

(2008)
This thesis consider some queuing models to determine the measures of performance of a model. The most important measures are the waiting time in the queue and the size of the queue. The queue we are studying is the Beit-eba ...
• #### Bridging Centrality in Scale- Free Network Using Bridging Nodes as the Boundary of Clustering ﻿

(2009)
Graph theory is one of the most popular fields in mathematics because if it&#039;s important applications in solving many problems in the real world and understanding many natural phenomena. This work focuses mainly on ...
• #### Error-Detecting and Error-Correcting Using Hamming and Cyclic Codes ﻿

(2009)
In this thesis we provide an overview of two types of linear block codes: Hamming and cyclic codes. We study the generation, encoding and decoding of these codes as well as studying schemes and/or algorithms of error-detecting ...
• #### Numerical Methods for Solving High-Order Boundary Value Problems ﻿

(2009)
The Boundary Value-Problems (BVPs) either the linear or nonlinear problems have many life and scientific applications. Many studies concerned with solving second-order boundary-value problems using several numerical ...
• #### Data Compression with Wavelets ﻿

(2009)
There are two types of data compression; the first is lossless(exact) and the second is lossy (approximate). In lossless compression, all details are reserved but high compression ratios can not be achieved and this type ...
• #### Numerical Methods for Solving Differential Algebraic Equations ﻿

(2010)
This study involves the implementation of two numerical methods for solving linear Deferential-algebraic equations (DAEs): Power series and Backward Difference Formula (BDF). It aims to facilitate dealing with DAEs by ...
• #### Singular Two Points Boundary Value Problem ﻿

(2010)
A singular Two points boundary value problem occur frequently in mathematical modeling of many practical problems. To solve singular two points boundary value problem for certain ordinary differential equations having ...
• #### An Inventory Control Model with (M/M/1) Queueing System and Lost Sales ﻿

(2011)
In this thesis We investigate M/M/1/ - queuing systems with inventory management, continuous review, and lost sales. Demand is Poisson, service times and lead times are exponentially distributed. These distributions are ...
• #### Analytical and Numerical Treatment of Maxwell's Equations ﻿

(2012)
Maxwell&#039;s equations are one of the most important models in different fields. It describes electromagnetic phenomena such as micro, radios and radar waves. The modeling of systems involving electromagnetic waves is ...
• #### Two-Sample Multivariate Test of Homogeneity Using Weighted Nearest Neighbours ﻿

(2012)
In this research we proposed a two-sample test related to that proposed by Schilling and Barakat tests , by taking into account all the points and their positions according to the nearest to the nearest technique starting ...
• #### Analytical and Numerical Solutions of Magnetohydrodynamic Flow Problems ﻿

(2013)
The MagnetoHydreoDynamic flow ( MHD ) is one of the most important topics in mathematical physics due to its wide range of applications . In this work we present some analytical and numerical solutions for some MHD problems ...
• #### Error Analysis and Stability of Numerical Schemes for Initial Value problems “IVP’s” ﻿

(2013)
Most of initial value problems are natural phenomena written in the language of mathematics. Solving these initial value problems is one of the most challenging fields in mathematics, because of the mathematicians’ continuous ...
• #### Numerical Treatment of The Fredholm Integral Equations of the Second Kind ﻿

(2013)
In this thesis we focus on the mathematical and numerical aspects of the Fredholm integral equation of the second kinddue to their wide range of physical application such as heat conducting radiation, elasticity, potential ...
• #### Analytical and Numerical Solutions of Volterra Integral Equation of the Second Kind ﻿

(2014)
In this thesis we focus on the analytical and numerical aspects of the Volterra integral equation of the second kind. This equation has wide range of applications in physics and engineering such as potential theory, Dirichlet ...
• #### Wavelets Numerical Methods for Solving Differential Equations ﻿

(2015)
In this thesis, a computational study of the relatively new numerical methods of Haar wavelets for solving linear differential equations is used. A comparison between the new method and some classical methods for linear ...
• #### A Comparable Study of Hiding Information in Images Using Least Significant Bit (LSB) Substitution and Pixel Value Differencing (PVD) Methods ﻿

(2016)
Steganography is one of the most powerful techniques that conceal the existence of hidden secret data inside a cover object. In this thesis, we take an image for a carrier of secret data which is known as a host or cover ...