This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreThe Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Corrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show MoreTi6Al4V alloy is widely used in aerospace and medical applications. It is classified as a difficult to machine material due to its low thermal conductivity and high chemical reactivity. In this study, hybrid intelligent models have been developed to predict surface roughness when end milling Ti6Al4V alloy with a Physical Vapor Deposition PVD coated tool under dry cutting conditions. Back propagation neural network (BPNN) has been hybridized with two heuristic optimization techniques, namely: gravitational search algorithm (GSA) and genetic algorithm (GA). Taguchi method was used with an L27 orthogonal array to generate 27 experiment runs. Design expert software was used to do analysis of variances (ANOVA). The experimental data were
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis research aimed to predict the permanent deformation (rutting) in conventional and rubberized asphalt mixes under repeated load conditions using the Finite Element Method (FEM). A three-dimensional (3D) model was developed to simulate the Wheel Track Testing (WTT) loading. The study was conducted using the Abaqus/Standard finite element software. The pavement slab was simulated using a nonlinear creep (time-hardening) model at 40°C. The responses of the viscoplastic model under the influence of the trapezoidal amplitude of moving wheel loadings were determined for different speeds and numbers of cycles. The results indicated that a wheel speed increase from 0.5Km/h to 1.0Km/h decreased the rut depth by about 22% and 24% in conv
... Show More