In this paper, we obtain a complete characterization for the norm and the minimum norm attainment sets of bounded linear operators on a real Banach spaces at a vector in the unit sphere, using approximate ðœ–-Birkhoff-James orthogonality techniques. As an application of the results, we obtained a useful characterization of
bounded linear operators on a real Banach spaces. Also, using approximate ðœ–-Birkhoff -James orthogonality proved that a Banach space is a reflexive if and only if for any closed hyperspace of , there exists a rank one linear operator such that , for some vectors in and such that 𜖠.Mathematics subject classification (2010): 46B20, 46B04, 47L05.
A flexible pavement structure usually comprises more than one asphalt layer, with varying thicknesses and properties, in order to carry the traffic smoothly and safely. It is easy to characterize each asphalt layer with different tests to give a full description of that layer; however, the performance of the whole; asphalt structure needs to be properly understood. Typically, pavement analysis is carried out using multi-layer linear elastic assumptions, via equations and computer programs such as KENPAVE, BISAR, etc. These types of analysis give the response parameters including stress, strain, and deflection at any point under the wheel load. This paper aims to estimate the equivalent Resilient Modulus (MR) of the asphalt concrete
... Show MoreSpectral and linear optical properties for a mixture of Rhodamine B (RB) and Fluorescein Sodium (Na Fl) organic laser dyes were determined at different concentrations 10-3, 10-4 M in ethanol solvent at room temperature. The intensity of absorption range is towards longer wavelengths (red shift). The quantum efficiency diminished while the radiative and fluorescence life time increased when increment concentration, organic laser dyes have a spectrum within the range 540-500 nm. Results demonstrate that a mixture of laser dyes are effective optical materials when contrasted with individual laser dyes. It can be utilized as resonator in cavity lasers.
This paper is used for solving component Volterra nonlinear systems by means of the combined Sumudu transform with Adomian decomposition process. We equate the numerical results with the exact solutions to demonstrate the high accuracy of the solution results. The results show that the approach is very straightforward and effective.
The theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreOur goal from this work is to find the linear prediction of the sum of two Poisson process
) ( ) ( ) ( t Y t X t Z + = at the future time 0 ), ( ≥ + τ τ t Z and that is when we know the values of
) (t Z in the past time and the correlation function ) (τ βz
Abstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreWith the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper, presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench
... Show MoreScheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreIn this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.
We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.