This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical simulation methods are compared with the standard results of the numerical method which is Runge-Kutta 4th Method from the year 2021 to 2025, using the absolute error, through comparison, it becomes clear that the approximate proposed solution is better and closer to the standard solution than the solutions of other methods that used to solve this system. The results are tabulated and represented graphically, as well as a discussion to prove the efficiency of the proposed methods.
Image combination is a technique that fuses two or more medical images taken with different conditions or imaging devices into a single image contain complete information. In this study relied on mathematical, statistical and spatial techniques, to fuse MRI images that captured horizontal and vertical times (T1, T2), and applied a method of supervised classification based on the minimum distance before and after combination process, then examine the quality of the resulting image based on the statistical standards resulting from the analysis of edge analysis, showing the results to identify the best techniques adopted in combination process, determine the exact details in each class and between classes.
Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength
... Show MoreCopyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show MoreMachine learning (ML) is a key component within the broader field of artificial intelligence (AI) that employs statistical methods to empower computers with the ability to learn and make decisions autonomously, without the need for explicit programming. It is founded on the concept that computers can acquire knowledge from data, identify patterns, and draw conclusions with minimal human intervention. The main categories of ML include supervised learning, unsupervised learning, semisupervised learning, and reinforcement learning. Supervised learning involves training models using labelled datasets and comprises two primary forms: classification and regression. Regression is used for continuous output, while classification is employed
... Show MoreRate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreNowadays, the process of ontology learning for describing heterogeneous systems is an influential phenomenon to enhance the effectiveness of such systems using Social Network representation and Analysis (SNA). This paper presents a novel scenario for constructing adaptive architecture to develop community performance for heterogeneous communities as a case study. The crawling of the semantic webs is a new approach to create a huge data repository for classifying these communities. The architecture of the proposed system involves two cascading modules in achieving the ontology data, which is represented in Resource Description Framework (RDF) format. The proposed system improves the enhancement of these environments ach
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe aim of the current paper is to resolve the non-uniqueness in gravity interpretation through searching for singular points in the gravity field that are coincide with causative body vertices. The Absolute Second Horizontal Gradient (ASHG) method is used to locate the horizontal reference location of the body, while its amplitude could be used to define body corner depth. Intelligent use of the ASHG method could help in differentiating between basin and intrusion structures from their gravity effect and could facilitate the interpretation in forward modeling and constrain inversion modeling to maximum limit. The method is tested by using many synthetic examples with different types of shapes. A real data is used to examine the method a
... Show MoreThe purpose of this research paper is to present the second-order homogeneous complex differential equation , where , which is defined on the certain complex domain depends on solution behavior. In order to demonstrate the relationship between the solution of the second-order of the complex differential equation and its coefficient of function, by studying the solution in certain cases: a meromorphic function, a coefficient of function, and if the solution is considered to be a transformation with another complex solution. In addition, the solution has been provided as a power series with some applications.