In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of Sherrod's model in predicting financial failure in Iraqi private banks. The researchers relied on this mathematical model to anal
... Show MoreAs we know the transportation studies regarded as one of a very
important and difficult studies and one of its difficulties created from the
process of data updating therefore the researcher well facing many difficulties
to balancing between the old data on collecting new data.
The research present an opinion which is summarized by: can we use
the old data after we updated and used it as alternatives? Or the researcher
must collect new data to complete their research which indicate to the present
situation and some times they cant complete their studies because of the
security, economic, temporally difficulties.
The research used two kinds of data, the old data which belong to the
period (1998) and new data
Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThis study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur
... Show MoreThere are many factors effect on the spread of infectious disease or control it,
some of these factors are (immigration and vaccination). The main objective of this
paper is to study the effect of those factors on the dynamical behavior of an SVIR
model. It is assumed that the disease is spread by contact between members of
populations individuals. While the recovered individuals gain permanent immunity
against the disease. The existence, uniqueness and boundedness of the solution of
this model are investigated. The local and global dynamical behaviors of the model
are studied. The local bifurcations and Hopf bifurcation of the model are
investigated. Finally, in order to confirm our obtained results and specify t
In this paper a mathematical model that analytically as well as numerically
the flow of infection disease in a population is proposed and studied. It is
assumed that the disease divided the population into five classes: immature
susceptible individuals (S1) , mature individuals (S2 ) , infectious individual
(I ), removal individuals (R) and vaccine population (V) . The existence,
uniqueness and boundedness of the solution of the model are discussed. The
local and global stability of the model is studied. Finally the global dynamics of
the proposed model is studied numerically.
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in