Preferred Language
Articles
/
ijs-2404
Approximation of Modified Baskakov Operators Based on Parameter s

In this article, we define and study a family of modified Baskakov type operators based on a parameter . This family is a generalization of the classical Baskakov sequence. First, we prove that it converges to the function being approximated. Then, we find a Voronovsky-type formula and obtain that the order of approximation of this family is . This order is better than the order of the classical Baskakov sequence  whenever . Finally, we apply our sequence to approximate two test functions and analyze the numerical results obtained.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
On Hereditarily Codiskcyclic Operators

Many codiskcyclic operators on infinite-dimensional separable Hilbert space do not satisfy the criterion of codiskcyclic operators. In this paper, a kind of codiskcyclic operators satisfying the criterion has been characterized, the equivalence between them has been discussed and the class of codiskcyclic operators satisfying their direct summand is codiskcyclic. Finally, this kind of operators is used to prove that every codiskcyclic operator satisfies the criterion if the general kernel is dense in the space.

Scopus (3)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
E·voiution of Topology and Wei,ght-s. of Neural Netwo·rks. Using.Semi Genetic Operators

Evolutionary·co.nipimit'iQo  is  a· c'!a s of glbbal ·searb  techniq

based on the lei.lffi:ing process ,of  g po_pl)'latiog-·of pote.n:tiaf solutions to

a  ven probl_e-ID'.  thahas .been  succe_ssfull'y  applied    19  v ety of

prQblern, lll thls paper a riew approach  to. design lie_ ural ne'twQj:ks

based oh ev.ohltipnary -computa.tio.rt i·s pre.Seri-L  _A   tine-f.!£ clurP.mosome

'repr:esentati:on  or the etwor}< i_s.  u_secl: 'Q.y  genetiC  gperntb_l:s, whicQ

allow th¢  voJution of.the   chitecture and' weight-s Â

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
Australian Journal Of Basic And Applied Sciences
Closure Operators on Graphs

The aim of this paper is to generate topological structure on the power set of vertices of digraphs using new definition which is Gm-closure operator on out-linked of digraphs. Properties of this topological structure are studied and several examples are given. Also we give some new generalizations of some definitions in digraphs to the some known definitions in topology which are Ropen subgraph, α-open subgraph, pre-open subgraph, and β-open subgraph. Furthermore, we define and study the accuracy of these new generalizations on subgraps and paths.

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Best Multiplier Approximation of Unbounded Periodic Functions in L_(p,∅_n ) (B),B=[0,2π] Using Discrete Linear Positive Operators

The purpose of this paper is to find the best multiplier approximation of unbounded functions in    –space by using some discrete linear positive operators. Also we will estimate the degree of the best multiplier approximation in term of modulus of continuity and the averaged modulus.

Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
On q-SZASZ- Mirakyan Operators of functions of Two Variables

In this paper, we define two operators of summation and summation-integral of q-type in two dimensional spaces. Firstly, we study the convergence of these operators and then we prove Voronovskaya- type asymptotic formulas for these operators.

View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 10 2017
Journal Name
International Journal Of Dynamics And Control
Scopus (10)
Crossref (7)
Scopus Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
Crossref
View Publication Preview PDF