In the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show Moreشهدت معظم المدن السومرية أزدهاراً أقتصادياً خلال عصر أور الثالثة ،أنعكس ذلك من خلال النصوص المسمارية المكتشفة ذات المضامين الاقتصادية المتنوعة ومنها (وصولات تسلم Bullae) التي تميزت بعصر أور الثالثة بأشكالها المتعددة ومنها: الكروية والمربعة والمستطيلة والمثلثة والمضلعة ومعظمها يحتوي على طبعات أختام فضلاً عن أنها تكون مثقوبة طولياً لغرض التعليق.
تناول البحث دراسة خمسة نصوص مسمارية لقروض غير منشورة من سلالة أور الثالثة وتحليلها وترجمتها وهي من مجموعة المتحف العراقي, يعود تاريخها الى زمن سلالة أور الثالثة (2012-2004ق.م) تحديدا الى زمن الملكين شوسين (2037- 2029ق.م) وابي سين (2028-2004 ق.م), اما مضامينها فهي قروض بمادتي الشعير(ثلاثة نصوص) الفضة (نصان), والقروض على نوعين قروض بفائدة (ur5 - ra), وقروض بدون فائدة (maš2 - nu - tuk), وقد حددت نسبة الفائدة في القروض 1/3 33% لمادة الشعير و20% لما
... Show MoreOne of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.
The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.
For data compression, where one is trying to find compact transform representations for a
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreIn this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.