The study presents the modification of the Broyden-Flecher-Goldfarb-Shanno (BFGS) update (H-Version) based on the determinant property of inverse of Hessian matrix (second derivative of the objective function), via updating of the vector s ( the difference between the next solution and the current solution), such that the determinant of the next inverse of Hessian matrix is equal to the determinant of the current inverse of Hessian matrix at every iteration. Moreover, the sequence of inverse of Hessian matrix generated by the method would never approach a near-singular matrix, such that the program would never break before the minimum value of the objective function is obtained. Moreover, the new modification of BFGS update (H-version) preserves the symmetric property and the positive definite property without any condition.
The current study aims to show the importance of plant products as mosquitocides against Culex quinquefasciatus. Castor oil Nanoemulsions were subedit in various ratios including castor oil, ethanol, tween 80, and deionized water by using ultrasonication. Thermodynamic, centrifugation, PH, assay which improved that the formula of 10 ml of castor oil, ethanol 5ml, tween 80 (14 ml) and deionized water 71ml was more stable than other formulas. The stable formula of castor oil nanoemulsion was characterized by transmission electron microscopy (TEM) and dynamic light scattering (DLS). Nanoemulsion droplets were spherical in shape and were found to have a Z-average diameter of 87.4nm. A concentration of ca
... Show MoreProdigiosin is a ‘natural red pigment produced by Serratia marcescens which exhibits immunosuppressive and anticancer properties in addition to antimicrobial activities. This work presents an attempt to maximize the production of prodigiosin by two different strategies: one factor at time (OFAT) and statistical optimization. The result of OFAT revealed that sucrose and peptone were the best carbon and nitrogen sources for pigment production with concentration of prodigiosin of about 135 mg/ L. This value was increased to 331.6mg/ L with an optimized ratio of C/N (60:40) and reached 356.8 with pH 6 and 2% inoculum size at end of classical optimization. Statistical experimental design based on Response surface methodology was co
... Show MoreIn this paper, a polymer-based composite material was prepared by hand Lay-up method consisting of epoxy resin as a base material reinforced by magnesium oxide powder once and silicon dioxide powder again and with different weight ratios (3, 6, 9 and 12) wt %. The three-point bending test was performed in normal conditions and after immersion in sulfuric acid. The results showed that the bending value decreased with the increase of the weighted ratio of the reinforcement material (MgO, SiO2). The Bending of samples reinforced by SiO2 was found to be less than the bending of samples reinforced by particles (MgO). For example, the bending of the SiO2 sample (0.32 mm) at the weighted ratio (3%) and for the MgO (0.18mm) sample at the weight
... Show MoreThe aim of this paper is to derive a posteriori error estimates for semilinear parabolic interface problems. More specifically, optimal order a posteriori error analysis in the - norm for semidiscrete semilinear parabolic interface problems is derived by using elliptic reconstruction technique introduced by Makridakis and Nochetto in (2003). A key idea for this technique is the use of error estimators derived for elliptic interface problems to obtain parabolic estimators that are of optimal order in space and time.
This study examines the position of comparative legislation (French legislation, English legislation, and Egyptian legislation) in addressing the regulation of personal civil liability (based on fault) for the government. About the damages caused by demonstrations in terms of their legal nature, their legal basis, and the pillars and conditions of that responsibility. Then, we explain the position of the Iraqi legislator and compare it with what is the case in the legislation mentioned above
Abstract
This study aims to identify the extent to which the criteria of the American Council for Teaching Foreign Languages (ACTFL) are included in the English language books for the fifth and sixth graders. To achieve the objective of the study, a content analysis card was prepared, where the classification of language proficiencies was divided into five main levels (beginner, intermediate, advanced, superior, and distinguished) of the four language skills (listening, speaking, reading, and writing), The content analysis card consisted of (89) indicators distributed at the four levels of language skills as follows: Listening (17), speaking (33), reading (15), and writing (26). The study sample consisted of Engl
... Show More
In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two. The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More