The question on affine Riesz basis of Walsh affine systems is considered. An affine Riesz basis is constructed, generated by a continuous periodic function that belongs to the space on the real line, which has a derivative almost everywhere; in connection with the construction of this example, we note that the functions of the classical Walsh system suffer a discontinuity and their derivatives almost vanish everywhere. A method of regularization (improvement of differential properties) of the generating function of Walsh affine system is proposed, and a criterion for an affine Riesz basis for a regularized generating function that can be represented as a sum of a series in the Rademacher system is obtained.
Treatises concerning analyzing the interior spaces multiplied and their directions varied, that some of them analyzed the interior space on the basis of the intellectual and philosophical affiliation or the historical period and others in the light of the concept and mechanisms of the shape. The researcher has not been able to find a research that dealt with analyzing the space within the systems of shape generation, thus it is possible to determine the research problem with the following question: to what extent is it possible to analyze the interior space based on systems of shape generation? As far as the importance of the research is concerned, it sheds light on five of the systems of the shape generation which are: Syntax, shape gra
... Show MoreAbstract
The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs
... Show MoreThe Geographic Information System (GIS) is considered one of the most prominent programs used to collect, analyze, display, process, and produce geographic information maps for a specific purpose. It is also considered one of the modern database programs. Additionally, we can perform statistical analysis within GIS on predefined data to produce quantitative results. In this study, data was collected from more than 80 engineering projects established in Baghdad City from soil investigation reports for the projects. Geographic information systems were used to produce objective maps showing the variation in the bearing capacity of shallow foundations in the soil of Baghdad Governorate. I
The main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg
... Show MoreSmart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology
... Show MoreThe issue of human rights occupies great importance on the academia as well as in the reality, especially after the spread of ideas related to these rights on one hand and the large number of violations they are exposed to on the other hand, which makes it necessary to develop fundamental solutions to the remove the obstacles of implementing human rights.
In this research entitled (The Legal Basis of the Right to the City: A Comparative Study) we dealt with a new concept of human rights and discussed the basis upon which it is based in international charters, constitutions and domestic laws.
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More