The purpose of this paper is to find the best multiplier approximation of unbounded functions in –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show Moreفعالية الوثب العالي تمتاز بالتكرار والممارسة لمراحل التسلسل الحركي بالتكرارات الصحيحة المصحوبة بالتغذية الراجعة من اجل الوصول إلى اداء افضل, ومن خلال عمل الباحثتان كونها تدريسية لمادة الساحة والميدان لاحظت ضعفا في مستوى الأداء الفني عند الطالبات في ضبط مراحل التسلسل الحركي الكامل لفعالية الوثب العالي ، لذا ارتأت الباحثتان اعداد تمرينات خاصة باستخدام أساليب التنافس حمل المتعلم على مضاعفة جهده لينافس ذاته
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreFree Space Optics (FSO) plays a vital role in modern wireless communications due to its advantages over fiber optics and RF techniques where a transmission of huge bandwidth and access to remote places become possible. The specific aim of this research is to analyze the Bit-Error Rate (BER) for FSO communication system when the signal is sent the over medium of turbulence channel, where the fading channel is described by the Gamma-Gamma model. The signal quality is improved by using Optical Space-Time Block- Code (OSTBC) and then the BER will be reduced. Optical 2×2 Alamouti scheme required 14 dB bit energy to noise ratio (Eb/N0) at 10-5 bit error rate (BER) which gives 3.5 dB gain as compared to no diversity scheme. Th
... Show MoreMost of the known cases of strong gravitational lensing involve multiple imaging of an active galactic nucleus. The properties of lensed active galactic nuclei make them promising systems for astrophysical applications of gravitational lensing. So we present a simple model for strong lensing in the gravitational lensed systems to calculate the age of four lensed galaxies, in the present work we take the freedman models with (k curvature index =0) Euclidian case, and the result show a good agreement with the other models.
This study investigates the effects of Al-Doura oil refinery effluent, in Baghdad city, on the water quality of the Tigris River using the Canadian Water Quality Index (CCME WQI) and Rivers Maintaining System (1967). Water samples were collected monthly from Tigris River at three stations, which are Al-Muthanna Bridge (upstream), Al-Doura Refinery (point source), and Al–Zafaraniya city (downstream) from October 2020 to April 2021. Fourteen water quality parameters were studied, namely pH (6.50-8.10), Water Temperature (WT) (5.00-27.00 °C), Electrical Conductivity (EC) (877.00-1192.00 μs/cm), Dissolved Oxygen (DO) (5.03-7.57 mg/L), Biological Oxygen demand (BOD) (0.53-2.23 mg/L), Total Dissolved S
In the present work theoretical relations are derived for the efficiency evaluation for the generation of the third and the fourth harmonics u$ing crystal cascading configuration. These relations can be applied to a wide class of nonlinear optical materials. Calculations are made for beta barium borate (BBO) crystal with ruby laser /.=694.3 nm . The case study involves producing the third harmonics at X. =231.4 nm of the fundamental beam. The formula of efficiency involves many parameters, which can be changed to enhance the efficiency. The results showed that the behavior of the efficiency is not linear with the crystal length. It is found that the efficiency increases when the input power increases. 'I'he walk-off length is calculated for
... Show MoreIn this study, the adsorption of Zn (NO3)2 is carried out by using surfaces of malvaparviflora. The validity of the adsorption is evaluated by using atomic absorption Spectrophotometry through determination the amount of adsorbed Zn (NO3)2. Various parameters such as PH, adsorbent weight and contact time are studied in terms of their effect on the reaction progress. Furthermore, Lagergren’s equation is used to determine adsorption kinetics. It is observed that high removal of Zn (NO3)2 is obtained at PH=2. High removal of Zn (NO3)2 is at the time equivalent of 60 min and reaches equilibrium,where 0.25gm is the best weight of adsorbant . For kinetics the reaction onto malvaparviflora follows pseudo first order Lagergren’s equation.