Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
By using governing differential equation and the Rayleigh-Ritz method of minimizing the total potential energy of a thermoelastic structural system of isotropic thermoelastic thin plates, thermal buckling equations were established for rectangular plate with different fixing edge conditions and with different aspect ratio. The strain energy stored in a plate element due to bending, mid-plane thermal force and thermal bending was obtained. Three types of thermal distribution have been considered these are: uniform temperature, linear distribution and non-linear thermal distribution across thickness. It is observed that the buckling strength enhanced considerably by additional clamping of edges. Also, the thermal buckling temperatures and
... Show MoreInflammatory response had a role in cancer progression, presence of noticeable inflammation within the tumor and its margin may play an important prognostic role in colorectal carcinoma.
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreBackground: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class I normal occlusion using Standardized photographic techniques and to verify the existence of possible gender differences. Materials and methods: Eighty Iraqi adult subjects (40 males and 40 females) with an age ranged between 18-25 years having class I normal occlusion were chosen for this study. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position which is mirror position which the patient looking straight into his eyes into the mirror mounted on the stand. The photographs were analyzed using A
... Show MoreBackground: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.
Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T
... Show MoreBackground: Asymmetry assessment is an important component of orthodontic diagnosis and treatment planning. Several studies attempted to find the relationship between craniometric asymmetry and skeletal jaws relationship and many authors found some extent of asymmetry in individuals with normal jaws relationship. The use of Computed tomography (CT) allows for the assessment of asymmetry on a dimensionally accurate volumetric image, aim of the study is to determine if there are differences in craniometric asymmetry between patient with skeletal class I and patients with skeletal class II relationship using Helical CT scan. Materials and Methods: Ninety individuals with clinically symmetrical faces were imaged with Helical CT scan, and aging
... Show MoreIn this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More