In this paper, the oscillatory properties and asymptotic behaviour of a third-order three-dimensional neutral system are discussed. Some sufficient conditions are obtained to ensure that all bounded positive solutions of the system are oscillatory or non-oscillatory. On the other hand, the non-oscillatory solutions either converge or diverge when goes to infinity. A special technique is adopted to include all possible cases. The obtained results include illustrative examples.
In this paper the Galerkin method is used to prove the existence and uniqueness theorem for the solution of the state vector of the triple linear elliptic partial differential equations for fixed continuous classical optimal control vector. Also, the existence theorem of a continuous classical optimal control vector related with the triple linear equations of elliptic types is proved. The existence of a unique solution for the triple adjoint equations related with the considered triple of the state equations is studied. The Fréchet derivative of the cost function is derived. Finally the theorem of necessary conditions for optimality of the considered problem is proved.
This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreLately, a growing interest has been emerging in age estimation from face images because of the wide range of potential implementations in law enforcement, security control, and human computer interactions. Nevertheless, in spite of the advances in age estimation, it is still a challenging issue. This is due to the fact that face aging process is not only set by distinct elements, such as genetic factors, but by extrinsic factors, such as lifestyle, expressions, and environment as well. This paper applied machine learning technique to intelligent age estimation from facial images using J48 classifier on FG_NET dataset. The proposed work consists of three phases; the first phase is image preprocessing which include
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show MoreIn this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected threshold based on experience
... Show Moreيعد نظام الإدارة البيئية ( EMS ) على وفق المواصفة ISO 14001:2015 من الانظمة الإدارية الحديثة والمهمة في وقتنا الحالي، اذ هو أحد أدوات الأدارة البيئية بعّده مدخلاً للمعالجة أو الحد من المخاطر البيئية وآثارها، وبالخصوص الاثار الناجمة من الصناعة النفطية والتي تعد المصدر الرئيس للتلوث البيئي وهدر ونفاذ الموارد الطبيعية. تتجلى مشكلة الدراسة في ضعف عملية تشخيص والحد من مخاطر الج
... Show MoreThe regulatory authorities have implemented various standards to address the risks associated with credit facilities. One important aspect is the use of the Credit Bureau System (CBS), which plays a central role in ensuring banking soundness. Thus, the study seeks to explore the role of CBS in attaining banking soundness as a fundamental principle. The research sample consisted of three Iraqi banks spanning from 2010 to 2022. The research findings indicated that the implementation of CBS had a significant positive impact on achieving Banking Soundness (BS) rates in my bank. Furthermore, the asset quality index's value increased significantly, surpassing the standard value of 5%. It became evident that the banks needed to formulate a well-de
... Show MoreThe palm vein recognition is one of the biometric systems that use for identification and verification processes since each person have unique characteristics for the veins. In this paper we can improvement palm vein recognition system have been made. The system based on centerline extraction of veins, and employs the concept of Difference-of Gaussian (DoG) Function to construct features vector. The tests results on our database showed that the identification rate is 100 % with the minimum error rate was 0.333.
Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas
... Show MoreThis article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H. Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation where , has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.