In this project, we are successfully discussed to contour integral and its applications.Contour integration is closely related to the calculus of residues. One of the advantage ofcontour integrals is the evaluation of ...
Abstract
The main purpose of this research was to find out the contributions of decomposing method in addition and subtractions of two digit numbers, the respondents for this research were second grade students from Ahmed ...
This study focused on “convolution integrals and their applications”. The study was designed to show the areas where convolution integrals are applicable and point out roles of convolution integrals in solving practical ...
The project treats the cubic spline interpolation and its applications. This method is more
appropriate for approximating a given function f(x) by another more convenient function
p(x).The Taylor’s polynomial and polynomial ...
In this project numerical procedures dependent on a relatively new B-spline called the cubic
Trigonometric B-spline (CTBS) and the finite difference methods (FDM) for Second order
non-classical diffusion problems are ...
Abstract
Nonlinear differential equations arise in all fields of applied mathematics, physics and Engineering hence being of fundamental importance of methods to find their solutions. In the 1980’s George Adomian introduced ...
Abstract
Since fluid flow is a branch of mechanics it satisfies a set of well documented basic laws (the governing laws), and thus a great deal of theoretical treatment is available. But viscosity and geometry are two ...
ABSTRACT
The purpose of this quasi-experimental single group study design was to develop the students’
understanding of solving linear equation with one variable through balancing model of teaching:
the case of grade ...
Abstract
The main purpose of this study was to examine whether the use of models in the teaching of two digit numbers develop students’ conceptual understandingof addition and subtraction operations. Consequently, ...
Abstract
Cryptographic hash function is a function that takes an arbitrary length as an input and
produces a fixed size of an output called message digest. This paper discuss an overview
of cryptographic hash function ...
In this project, we analyse a bionomic model of two competitive species in the presence of
toxicity with different harvesting efforts. It is noted that under certain parametric restrictions,
the model has a unique
positive ...