In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
Truncated distributions arise naturally in many practical situations. It’s a conditional distribution that develops when the parent distribution's domain is constrained to a smaller area. The distribution of a right truncated is one of the types of a single truncated that is restricted within a specific field and usually occurs when the specified period for the study is complete. Hence, this paper introduces Right Truncated Inverse Generalized Rayleigh Distribution (RTIGRD) with two parameters is introduced. Then, provided some properties such as; (probability density function, cumulative distribution function (CDF), survival function, hazard function, rth moment, mean, variance, Moment Generating Function, Skewness, kurtosi
... Show MoreThis study was aimed to find and test biological methods for reducing the aggregation of plastics such as PS in the environment and study the ability of Greater Wax worms larvae (Galleria mellonella) to eat PS that similar in the its structure to beeswax .Weight loss, morphology changes ,FTIR spectroscopy and GC-mass analysis were performed which showed changes in chemical properties of the PS due to degradation. In this study the percentage of weight loss was 33% in the PS treated with G. mellonella. FTIR of PS frass showed the disappearance of aromatic cycle band that was found in the origin PS at region more than 3000 cm-1. Also The PS frass samples from wax worms larvae revealed the creation of a new O-H stretching alcohol
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show Moreتستند أغلب الطرائق الحصينة على فكرة التنازل عن جانب معين مقابل تقوية جانب آخر من خلال عدة أساليب أما آليات الذكاء الصناعي تحاول عمل موازنة بين الضعف والقوة للوصول إلى أفضل الحلول بأسلوب بحث عشوائي . في هذا البحث تم تقديم فكرة جديدة لتحسين مقدرات معلمات نماذج المعادلات الآنية الخطية الناتجة من طريقة المتغيرات المساعدة حسب طريقة جاكنايف Jackknife Instrumental Variable Estimation(JIVE) وذل
... Show MoreThe reaction paths of the C-C and C-H bond cleavage in the anthracene and phenanthrene aromatic molecules are studied by applying the ab-initio DFT method. It is found that the C-C bond cleavage proceeds via a singlet aromatic transition state, compelled through a disrotatoric ring opening reaction. A suprafacial H atom shift follows the transition state, leading to the formation of a methylene -CH2 and an acetylenic or allenic moiety. The calculated activation energies for anthracene range from 158.81-208.90 kcal/mol and the reaction energies from 96.106-156.976 kcal/mol. For phenanthrene, the energy values are 157.39-202.34 kcal/mol and 62.639-182.423 kcal/mol, respectively. For the C-H cleavage reactions, the calculated reaction energies
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreIn this paper, we define some generalizations of topological group namely -topological group, -topological group and -topological group with illustrative examples. Also, we define grill topological group with respect to a grill. Later, we deliberate the quotient on generalizations of topological group in particular -topological group. Moreover, we model a robotic system which relays on the quotient of -topological group.