A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm competes favorably with SWT, and SLT based algorithms, and obtain up to 1.23 dB PSNR improvement.
Immunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of pub
... Show MoreThis article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
In this paper, we will prove the following theorem, Let R be a ring with 1 having
a reverse derivation d ≠ 0 such that, for each x R, either d(x) = 0 or d(x) is
invertible in R, then R must be one of the following: (i) a division ring D, (ii) D 2 ,
the ring of 2×2 matrices over D, (iii) D[x]/(x ) 2
where char D = 2, d (D) = 0 and
d(x) = 1 + ax for some a in the center Z of D. Furthermore, if 2R ≠ 0 then R = D 2 is
possible if and only if D does not contain all quadratic extensions of Z, the center of
D.
this paper, we will prove the following theorem, Let R be a ring with 1 having
a reverse derivation d ≠ 0 such that, for each x R, either d(x) = 0 or d(x) is
invertible in R, then R must be one of the following: (i) a division ring D, (ii) D 2 ,
the ring of 2×2 matrices over D, (iii) D[x]/(x ) 2
where char D = 2, d (D) = 0 and
d(x) = 1 + ax for some a in the center Z of D. Furthermore, if 2R ≠ 0 then R = D 2 is
possible if and only if D does not contain all quadratic extensions of Z, the center of
D.
The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show MorePlayfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposi
... Show MoreThe main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.
This paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displace
... Show MoreIn this research study Hardness (shore D), Water absorption,
Flexural, Impact Test, and Fracture Toughness of polymer nano
composites. The polymer nano composites based on unsaturated
polyester resin reinforced with Kevlar fibers (K.F). The samples are
attended by hand lay – up method according to (Rule mixture) for
various volume fractions of unsaturated polyester resin, fiber and
carbon nanotube. The polyester resin was matrix strengthened with
3% volume fraction from Kevlar fiber and (0.5%, 1%, 1.5%, 2%)
volume fractions of carbon nanotube. The water absorption, hardness
(shore D), flexural test, impact test and toughness fracture properties
were studied. Results showed that the water absorption increas