In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods is produced. Finally, for more explanation, an algorithm is proposed and applied for testing examples to illustrate the effectiveness of the new technique.
The types of traditional houses vary from region to region according to physical and non-physical circumstances, and Sulaymaniyah city is characterized by a type of traditional houses that differ significantly from those in most cities and regions neighboring are always different from the general pattern that is prevalent in the region and the Muslim world.
The aim of this research is to study the cause of this difference or distinction in the traditional houses in Sulaimaniyah city, by comparing the most common models in these houses and comparing them with the general models of village houses that originally existed in the region to relaize the convergence and contrast between them. The research was based on a co
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreThe invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThe accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.
This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was ex
... Show MoreIn the present study, magnet silica-coated Ag2WO4/Ag2S nanocomposites (FOSOAWAS) were fabricated via a multistep method to address the drawbacks related to single photocatalysts (pure Ag2WO4 and pure Ag2S) and to clarify the significant influence of semiconductor heterojunction on the enhancement of visible-light-driven organic degradation. Different techniques were performed to investigate the elemental composition, morphology, magnetic and photoelectrochemical properties of the fabricated FOSOAWAS photocatalyst. The FOSOAWAS photocatalyst (1 g/L) exhibited excellent photodegradation efficiency (99.5%) against Congo red dye (CR = 20 ppm) after 140 min of visible-light illumination. This result confirmed the ability of the heterojunction be
... Show More