This article will introduce a new iteration method called the zenali iteration method for the approximation of fixed points. We show that our iteration process is faster than the current leading iterations like Mann, Ishikawa, oor, D- iterations, and *- iteration for new contraction mappings called quasi contraction mappings. And we proved that all these iterations (Mann, Ishikawa, oor, D- iterations and *- iteration) equivalent to approximate fixed points of quasi contraction. We support our analytic proof by a numerical example, data dependence result for contraction mappings type by employing zenali iteration also discussed.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThis research aims to predict the value of the maximum daily loss that the fixed-return securities portfolio may suffer in Qatar National Bank - Syria, and for this purpose data were collected for risk factors that affect the value of the portfolio represented by the time structure of interest rates in the United States of America over the extended period Between 2017 and 2018, in addition to data related to the composition of the bonds portfolio of Qatar National Bank of Syria in 2017, And then employing Monte Carlo simulation models to predict the maximum loss that may be exposed to this portfolio in the future. The results of the Monte Carlo simulation showed the possibility of decreasing the value at risk in the future due to the dec
... Show MoreBackground: Beta thalassemia major is an inherited disorder that may affect general and oral health.The purpose of this study was toassess the severity of dental caries in relation to oral cleanliness, mutans streptococciamong a group of boys with beta thalassemia majorin comparison with a control group. Materials and Methods: The study involved 30 boys with BTM aged 10-12 years compared to 30 healthy boys with the same age group. d1-4mfs and D1-4 MFS indices were applied (Muhlemann, 1976), the viable counts of mutans streptococci in stimulated saliva were also determined. Results: The entire thalassemic group was caries-active. For both dentitions, a higher dmfs/DMFS values were recorded for study compared to control group, difference was
... Show MoreIn order to investigate the levels of reduced glutathione GSH and α1-antitrypsine in the sera of 20 type 2 diabetic patients and 10 healthy subjects, were enrolled in this study. A significant reduction in GSH level was found in the patient group compared with control. On the other hand a significant elevation in α1-antitrypsine in patient compared with control was observed. Correlation between α1-antitrypsine and reduced glutathion was found to be positive (+Ve) for diabetes mellitus type2 patients and negative (-Ve) for healthy control with r values 0.257 and – 0.339 respectively. In conclusion the depletion of GSH as antioxidant defense insured higher free radical generation in diabetic patients
... Show MoreContamination of surface and groundwater with excessive concentrations of fluoride is of significant health hazard. Adsorption of fluoride onto waste materials of no economic value could be a potential approach for the treatment of fluoride-bearing water. This experimental and modeling study was devoted to investigate for the first the fluoride removal using unmodified waste granular brick (WGB) in a fixed bed running in continuous mode. Characterization of WGB was carried out by FT-IR, SEM, and EDX analysis. The batch mode experiments showed that they were affected by several parameters including contact time, initial pH, and sorbent dosage. The best values of these parameters that provided maximum removal percent (82%) with the in
... Show MoreWe studied the effect of Ca- doping on the properties of Bi-based superconductors by
adding differ ent amounts of CaO
to the Bi
2
Sr2La2-xCaxCu3O10+δ
compound. consequently, we
obtained three samples A,B and C with x=0.0, 0.4 and 0.8 respectively. The usual solid-state
reaction method has been applied under optimum conditions. The x-ray diffraction analy sis
showed that the samples A and B have tetragonal structures conversely the sample C has an
orthorhombic structure. In addition XRD analysis show that decreasing the c-axis lattice
constant and thus decreasing the ratio c/a for samples A,B and C resp ectively. The X-ray
florescence proved that the compositions of samples A,B and C with the ra
In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More