In this paper the modified trapezoidal rule is presented for solving Volterra linear Integral Equations (V.I.E) of the second kind and we noticed that this procedure is effective in solving the equations. Two examples are given with their comparison tables to answer the validity of the procedure.
Lately, a growing interest has been emerging in age estimation from face images because of the wide range of potential implementations in law enforcement, security control, and human computer interactions. Nevertheless, in spite of the advances in age estimation, it is still a challenging issue. This is due to the fact that face aging process is not only set by distinct elements, such as genetic factors, but by extrinsic factors, such as lifestyle, expressions, and environment as well. This paper applied machine learning technique to intelligent age estimation from facial images using J48 classifier on FG_NET dataset. The proposed work consists of three phases; the first phase is image preprocessing which include
... Show MoreThe nuclear density distributions and size radii are calculated for one-proton 8B, two-proton 17Ne, one-neutron 11Be and two-neutron 11Li halo nuclei. The theoretical outlines of calculations assume that the nuclei understudy are composed of two parts: the stable core and the unstable halo. The core part is studied using the radial wave functions of harmonic-oscillator (HO) potentials, while the halo is studied through Woods-Saxon (WS) potential. The long tail behaviour which is the main characteristic of the halo nuclei are well generated in comparison with experimental data. The calculated size radii are in good agreement with experimental values. The elastic electron scattering form
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreHuman perception involves many cognitive processes, such as memory, attention, and critical thinking. An important cognitive process is memory, which is usually connected with the storing and retrieval of information. Different colors and labeling have diverse physiological effects on humans. Our investigation aimed to determine if a change in color or labeling would have a significant effect on memory span and serial recall. However, our results do not support that coloring and labeling have significant impacts on a subject’s memory.
The work in this paper focuses on solving numerically and analytically a nonlinear social epidemic model that represents an initial value problem of ordinary differential equations. A recent moking habit model from Spain is applied and studied here. The accuracy and convergence of the numerical and approximation results are investigated for various methods; for example, Adomian decomposition, variation iteration, Finite difference and Runge-Kutta. The discussion of the present results has been tabulated and graphed. Finally, the comparison between the analytic and numerical solutions from the period 2006-2009 has been obtained by absolute and difference measure error.
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreThis paper deals with constructing mixed probability distribution from exponential with scale parameter (β) and also Gamma distribution with (2,β), and the mixed proportions are ( .first of all, the probability density function (p.d.f) and also cumulative distribution function (c.d.f) and also the reliability function are obtained. The parameters of mixed distribution, ( ,β) are estimated by three different methods, which are maximum likelihood, and Moments method,as well proposed method (Differential Least Square Method)(DLSM).The comparison is done using simulation procedure, and all the results are explained in tables.
Estimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The selection
... Show MoreEstimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The se
... Show MoreThe charge density distributions (CDD) and the elastic electron
scattering form factors F(q) of the ground state for some even mass
nuclei in the 2s 1d shell ( Ne Mg Si 20 24 28 , , and S 32 ) nuclei have
been calculated based on the use of occupation numbers of the states
and the single particle wave functions of the harmonic oscillator
potential with size parameters chosen to reproduce the observed root
mean square charge radii for all considered nuclei. It is found that
introducing additional parameters, namely 1 , and , 2 which
reflect the difference of the occupation numbers of the states from
the prediction of the simple shell model leads to a remarkable
agreement between the calculated an