Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an effective tool for reducing both the dependency problem and the wrapping effect. By construction, Taylor model methods appear particularly suitable for integrating nonlinear ODEs. In this paper, we analyze Taylor model based integration of ODEs and compare Taylor model with traditional enclosure methods for IVPs for ODEs. More advanced Taylor model integration methods are discussed in the algorithm (1). For clarity, we summarize the major steps of the naive Taylor model method as algorithm 1.
The research aims to investigate the relationship and impact of e-governance as an independent variable in achieving creative performance as a dependent variable. These variables have been studied in the Directorate of Passports Affairs, and seek to come up with a set of recommendations that help in promoting e-governance in the researched organization, and the researcher adopted the descriptive-analytical approach, included The sample (122) of the total (194) individuals distributed in several administrative levels (officers, associates, and administrative staff). By adopting the questionnaire, which included (49) paragraphs as the main tool for the collection of data and information, as well as personal interviews and field obs
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreThe activation energy and optical band gap of different regions (p-type) polysilicon have been measured. Both microscopic studies and current-voltage characteristics of diodes prepared on different surface regions were carried out. Comparison of diodes parameters and microscopic studies indicate that the type of angles between boundaries has a significant effect on diodes parameters while the boundary lengths per unit area has less effect. The mechanism of Al-interaction with grain boundaries and their intersecting points at different temperature were also studies. The X-ray fluorescence spectrometry has been used for detection of diffused A1%.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.
Discrete Krawtchouk polynomials are widely utilized in different fields for their remarkable characteristics, specifically, the localization property. Discrete orthogonal moments are utilized as a feature descriptor for images and video frames in computer vision applications. In this paper, we present a new method for computing discrete Krawtchouk polynomial coefficients swiftly and efficiently. The presented method proposes a new initial value that does not tend to be zero as the polynomial size increases. In addition, a combination of the existing recurrence relations is presented which are in the n- and x-directions. The utilized recurrence relations are developed to reduce the computational cost. The proposed method computes app
... Show MoreThe possible effects of COVID-19 vaccines on reproductive health and male fertility in particular have been discussed intensely by the scientific community and the public since their introduction during the pandemic. On news outlets and social media platforms, many claims have been raised regarding the deleterious effects of COVID-19 vaccines on sperm quality without scientific evidence. In response to this emerging conflict, we designed this study to evaluate and assess the effect of the Pfizer-BioNTech mRNA COVID-19 vaccine on male fertility represented by the semen analysis parameters.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe recent studies suggested the possible toxicities or genetic alterations associated with biological and medical applications of silver nanoparticles (AgNPs). The current research is directed to see if AgNPs administration can lead to some changes in expression of BRAF gene in selected body organs tissues. Fifty-six male of musmusculs (Balb/C) mice from the animal house of Al-Nahrain Centre of Biotechnology were used. These animals were divided randomly to seven groups (eight mouse in each group), one of these groups represented the control group, three groups were subjected to different doses of AgNPs (0.25, 0.5and 1 mg/kg of body weight) for one week, and the remaining three groups were subjected to three different doses of AgNP
... Show More