In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreBackground: Osteoarthritis OA is the most common joint disorder in the world. Injection of high molecular weight hyaluronic acid intra-articular with steroid is a one of the used therapeutic option for patients with (OA)knee.
Objectives: Objective of this study was the evaluation the efficacy, safety, pluse duration of action of viscosupplementation of the HMWHA( high molecular weight hyluranic acid ).
Type of the study: Cross-sectional study.
Methods: From 81 patients with sever knee pain due to OA (grades 3–4) were recruited from Al-Yarmouk teaching hospital & a private clinic during the period from January 2014 till July 2016.
... Show MoreOne of the unique properties of laser heating applications is its powerful ability for precise pouring of energy on the needed regions in heat treatment applications. The rapid rise in temperature at the irradiated region produces a high temperature gradient, which contributes in phase metallurgical changes, inside the volume of the irradiated material. This article presents a comprehensive numerical work for a model based on experimentally laser heated AISI 1110 steel samples. The numerical investigation is based on the finite element method (FEM) taking in consideration the temperature dependent material properties to predict the temperature distribution within the irradiated material volume. The finite element analysis (FEA) was carried
... Show MoreThe first step in this research is to find some of the necessary estimations in approximation by using certain algebraic polynomials, as well as we use certain specific points in approximation. There are many estimations that help to find the best approximation using algebraic polynomials and geometric polynomials. Throughout this research, we deal with some of these estimations to estimate the best approximation error using algebraic polynomials where the basic estimations in approximation are discussed and proven using algebraic polynomials that are discussed and proven using algebraic polynomials that are specified by the following points and if as well as if .
For the second step of the work, the estimatio
... Show MoreThe international community began to realize, following the discovery of vast wealth in areas that fall outside the territorial limits of states sovereignty, that the huge difference in scientific and technological development between developed and developing countries may give developed countries the opportunity to exploit these wealth, and this, in turn, will lead to a widening gap between countries, developed and developing countries, and the consolidation of the principle of inequality due to the lack of third world countries with the capabilities that allow them to participate in the exploitation of these wealth, and when these concerns came to the fore in the United Nations General Assembly in 1967, Ambassador Arvid Bardo, th
... Show MoreBackground: Knee osteoarthritis (KOA) is a common joint disorder leading to considerable pain and locomotor disability in lower limb function. Locomotor disability, which is difficulty in activities of daily living related to lower limb function, can be the consequence of KOA, so early diagnosis and management may improve quality of life.
Objective: To assess the contribution of radiological osteoarthritis of the knees to disability in the activities of daily living related to lower limb function.
Methods: One hundred twenty Iraqi KOA patients (104 females and 16 males) who were attending to Rheumatology Unit, Full history was taken and complete clinical exami
... Show MoreThe aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, wh
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreThis paper comprises the design and operation of mono-static backscatter lidar station based on a pulsed Nd: YAG laser that operates at multiple wavelengths. The three-color lidar laser transmitter is based on the collinear fundamental 1064 nm, second harmonic 532 nm and a third harmonic 355nm output of a Nd:YAG laser. The most important parameter of lidar especially daytime operations is the signal-to-noise ratio (SNR) which gives some instructions in designing of lidar and it is often limit the effective range. The reason is that noises or interferences always badly affect the measured results. The inversion algorithms have been developed for the study of atmospheric aerosols. Signal-to-noise ratio (SNR) of three-color channel re
... Show More