In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc
... Show MoreThis study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
The reaction of 2-amino benzoic acid with 1,2-dichloroethane under reflux in methanol and KOH as a base to gave the precursor [H4L]. The precursor under reflux and drops of CH3COOH which reacted with (2mole) from salicycaldehyde in methanol to gave a new type N2O4 ligand [H2L], this ligand was reacted with (MCl2) Where [M= Co (II), Ni(II), Cu(II) and Zn(II)] in (1:1) ratio at reflux in methanol using KOH as a base, to give complexes of the general formula [M(L)]. All compounds have been characterized by spectroscopic methods [1H NMR ( just to the ligand), FTIR, uv-vis, atomic absorption], melting point, conductivity, chloride content, as well as m
... Show MoreThe reaction of 2-amino benzoic acid with 1,2-dichloroethane under reflux in methanol and KOH as a base to gave the precursor [H4L]. The precursor under reflux and drops of CH3COOH which reacted with (2mole) from salicycaldehyde in methanol to gave a new type N2O4 ligand [H2L], this ligand was reacted with (MCl2) Where [M= Co (II), Ni(II), Cu(II) and Zn(II)] in (1:1) ratio at reflux in methanol using KOH as a base, to give complexes of the general formula [M(L)]. All compounds have been characterized by spectroscopic methods [1H NMR ( just to the ligand), FTIR, uv-vis, atomic absorption], melting point, conductivity, chloride content, as well as magnetic susceptibility measurements. From the above data, the proposed molecular structu
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreOur country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.
The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.
Aims:
The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.