In this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained for each subpopulation as a vector distribution. The numerical outputs are tabulated, graphed, and compared with previous statistical estimations for 2013, 2015, and 2030, respectively. The solutions of FD and MMCFD are found to be in good agreement with small standard deviation of the means, and small measure of difference. The new MMCFD method is useful to predict intervals of random distributions for the numerical solutions of this epidemiology model with better approximation and agreement between existing statistical estimations and FD numerical solutions.
Referral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the and articles, as expressed by a particular client, and is a combination of affi
... Show MoreTechnologies of the theatre show elements get great transferring concerning the creative embodiment of its aesthetic elements including its raws, forms, parts and masses in an attempt to achieve the prin cipal expressive progress to embody the main theme of the idea and the intended subject .
This is within the criterion of supporting the way to deal with technologies (décor elements , lighting music tones vocal affects , fashion and makeup) that achieving the emagintional appropriate atmosbheres which the writer and the director of the theatre show aim to make it present and succeed by furming active participation tunches of the ability of the cinogra . phic – element dsigners in order to invlve the theatre space atmospheres in cl
Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B
... Show MoreIn this work, a modern optical system based on modulation technique is constructed to achieve the retrieval of optical defects and distortions of the images behind dark barriers. A 800x600 analog spatial light modulator (SLM) is used in this technique with a 632.8nm He-Ne laser, a circular metallic mesh (CMM) is imaged and disturbed and then dealing with our system. The SLM was confirmed for irregularity improvement such as variable diffracted optical element (DOE) control. The obtained results showed that the effect of distortion has been treated and reduced to be minimum by controlling phase and amplitude modulation of the scattered wave front utilizing the SLM. The obtained images showed identical to the original image wi
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreThis work explores the designing a system of an automated unmanned aerial vehicles (UAV( for objects detection, labelling, and localization using deep learning. This system takes pictures with a low-cost camera and uses a GPS unit to specify the positions. The data is sent to the base station via Wi-Fi connection.
The proposed system consists of four main parts. First, the drone, which was assembled and installed, while a Raspberry Pi4 was added and the flight path was controlled. Second, various programs that were installed and downloaded to define the parts of the drone and its preparation for flight. In addition, this part included programs for both Raspberry Pi4 and servo, along with protocols for communication, video transmi
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show More