In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
The main objective of this paper is to introduce and study the generality differential operator involving the q-Mittag-Leffler function on certain subclasses of analytic functions. Also, we investigate the inclusion properties of these classes, by using the concept of subordination between analytic functions.
A simple UV spectrophotometric differential derivatization method was performed for the simultaneous quantification of three aromatic amino acids of tryptophan, the polar tyrosine and phenylalanine TRP, TYR and PHE respectively. The avoidance of the time and reagents consuming steps of sample preparation or analyze separation from its bulk of interferences made the approach environmentally benign, sustainable and green. The linear calibration curves of differential second derivative were built at the optimum wavelength for each analyze (218.9, 236.1 and 222.5 nm) for PHE, TRP and TYR respectively. Quantification for each analyze was in the concentration range of (1.0– 45, 0.1–20.0 and 1.0– 50.0 μg/ml) at replicates of (n=3) with a re
... Show More In this paper we introduce many different Methods of ridge regression to solve multicollinearity problem in linear regression model. These Methods include two types of ordinary ridge regression (ORR1), (ORR2) according to the choice of ridge parameter as well as generalized ridge regression (GRR). These methods were applied on a dataset suffers from a high degree of multicollinearity, then according to the criterion of mean square error (MSE) and coefficient of determination (R2) it was found that (GRR) method performs better than the other two methods.
Suppose that is a finite group and is a non-empty subset of such that and . Suppose that is the Cayley graph whose vertices are all elements of and two vertices and are adjacent if and only if . In this paper, we introduce the generalized Cayley graph denoted by that is a graph with vertex set consists of all column matrices which all components are in and two vertices and are adjacent if and only if , where is a column matrix that each entry is the inverse of similar entry of and is matrix with all entries in , is the transpose of and . In this paper, we clarify some basic properties of the new graph and assign the structure of when is complete graph , complete bipartite graph and complete
... Show MoreThis paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The goal of this article is to construct fibrewise w-compact (resp. locally w-compact) spaces. Some related results and properties of these concepts will be investigated. Furthermore, we investigate various relationships between these concepts and three classes of fibrewise w-separation axioms.
Our aim in this work is to study the classical continuous boundary control vector problem for triple nonlinear partial differential equations of elliptic type involving a Neumann boundary control. At first, we prove that the triple nonlinear partial differential equations of elliptic type with a given classical continuous boundary control vector have a unique "state" solution vector, by using the Minty-Browder Theorem. In addition, we prove the existence of a classical continuous boundary optimal control vector ruled by the triple nonlinear partial differential equations of elliptic type with equality and inequality constraints. We study the existence of the unique solution for the triple adjoint equations
... Show MoreWhen soft tissue planning is important, usually, the Magnetic Resonance Imaging (MRI) is a medical imaging technique of selection. In this work, we show a modern method for automated diagnosis depending on a magnetic resonance images classification of the MRI. The presented technique has two main stages; features extraction and classification. We obtained the features corresponding to MRI images implementing Discrete Wavelet Transformation (DWT), inverse and forward, and textural properties, like rotation invariant texture features based on Gabor filtering, and evaluate the meaning of every
... Show MoreIn this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreLike the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show More