The palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
In this paper, Bayes estimators for the shape and scale parameters of Weibull distribution have been obtained using the generalized weighted loss function, based on Exponential priors. Lindley’s approximation has been used effectively in Bayesian estimation. Based on theMonte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s).
In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreIn this paper, some estimators for the unknown shape parameter and reliability function of Basic Gompertz distribution have been obtained, such as Maximum likelihood estimator and Bayesian estimators under Precautionary loss function using Gamma prior and Jefferys prior. Monte-Carlo simulation is conducted to compare mean squared errors (MSE) for all these estimators for the shape parameter and integrated mean squared error (IMSE's) for comparing the performance of the Reliability estimators. Finally, the discussion is provided to illustrate the results that summarized in tables.
In this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .
Abstract
The common types of movement disorders are ; dystonia which is a syndrome of repetitive muscle contractions. While , Huntington disease is autosomal dominant progressive neurodegenerative disorder, which is characterized by involuntary movements (“chorea”).
Tetrabenazine therapy has been shown to effectively control this movements compared with placebo.
Design the proper dosing approach for patients treated with tetrabenazine with genotype polymorphisms and their hepatic effect on patients.
A prospective case controlled study was carried on 50 patients whom divided into 2 groups :first group involved 25 patients who had cho
... Show MoreSolar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so
... Show MoreIn this paper, the Adomian decomposition method (ADM) is successfully applied to find the approximate solutions for the system of fuzzy Fredholm integral equations (SFFIEs) and we also study the convergence of the technique. A consistent way to reduce the size of the computation is given to reach the exact solution. One of the best methods adopted to determine the behavior of the approximate solutions. Finally, the problems that have been addressed confirm the validity of the method applied in this research using a comparison by combining numerical methods such as the Trapezoidal rule and Simpson rule with ADM.
The DEM (Digital elevation model) means that the topography of the earth's surface (such as; Terrain relief and ocean floors), can be described mathematically by elevations as functions of three positions either in geographical coordinates, (Lat. Long. System) or in rectangular coordinates systems (X, Y, Z). Therefore, a DEM is an array number that represents spatial distributions of terrain characteristics. In this paper, the contour lines with different interval of high-resolution digital elevation model (1m) for AL-khamisah, The Qar Government was obtained. The altitudes ranging is between 1 m – 8.5 m, so characterized by varying heights within a small spatial region because it represents in multiple spots with flat surfaces.
This paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show More