The researcher [1-10] proposed a method for computing the numerical solution to quasi-linear parabolic p.d.e.s using a Chebyshev method. The purpose of this paper is to extend the method to problems with mixed boundary conditions. An error analysis for the linear problem is given and a global element Chebyshev method is described. A comparison of various chebyshev methods is made by applying them to two-point eigenproblems. It is shown by analysis and numerical examples that the approach used to derive the generalized Chebyshev method is comparable, in terms of the accuracy obtained, with existing Chebyshev methods.
This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse
... Show MoreBackground: The skull base and the hard palate contain many anatomical features that make them rich in information which are useful in sex differentiation; in addition to that they have the ability to resist the hardest environmental conditions that support them in making sex differentiation. Three dimensional computed tomographic techniques has important role in differentiation between sex since it offers images with very accurate data and details of all anatomical structures with high resolution. This study was made to study sex variations among Iraqi sample by craniometric linear measurements of the hard palate and the skull base using 3D reconstructed Computed Tomographic scan. Materials and methods: This study composed of 100 Iraqi su
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreIn this study, the Halder-Wagner method was used for an analysisX-ray lines of Tio2 nanoparticles. Where the software was used to calculate the FWHM and integral breath (β) to calculate the area under the curve for each of the lines of diffraction. After that, the general equation of the halder- Wagner method is applied to calculate the volume (D), strain (ε), stress (σ), and energy per unit(u). Volume (β). Where the value of the crystal volume was equal to (0.16149870 nm) and the strain was equal to (1.044126), stress (181.678 N / m2), and energy per unit volume (94.8474 J m-3).The results obtained from these methods were then compared with those obtained from each of the new paradigm of the HalderWagner method, the Shearer developm
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show More