In this paper, we use the repeated corrected Simpson's 3/8 quadrature method for obtaining the numerical solutions of Fredholm linear integral equations of the second kind. This method is more accurately than the repeated corrected Trapezoidal method and the repeated Simpson's 3/8 method. To illustrate the accuracy of this method, we give a numerical example
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreCytokines are a group of immunomodulatory proteins leading to a variety of immune reactions in the human; these cytokines play a significant role in the development of appropriate immune responses against T. gondii. This study aims to reveal the association of toxoplasmosis with serum levels of IL-3, IL-17A, and IL-27 in aborted women. The blood samples of patients and controls were collected from Al-Alawiya Maternity Teaching Hospital/Baghdad/Iraq from 2019 to 2020 for detecting anti-T. gondii antibodies (IgG and IgM) and the level of interleukins by ELISA. The results of TORCH by rapid test for recurrent abortion recorded 25.3% seropositive for anti-Toxoplasma antibodies, and 31.5% seropositive for one or more cases of TORCH test (Cytomeg
... Show MoreA (k,n)-arc A in a finite projective plane PG(2,q) over Galois field GF(q), q=p⿠for same prime number p and some integer n≥2, is a set of k points, no n+1 of which are collinear. A (k,n)-arc is complete if it is not contained in a(k+1,n)-arc. In this paper, the maximum complete (k,n)-arcs, n=2,3 in PG(2,4) can be constructed from the equation of the conic.
In this research, a new 1, 3, 4-Thiadiazole derivatives have been synthesized by many heterocyclic reactions. Starting from (2, 5 – dimercapto -1, 3, 4-Thiadiazole) a variety of derivatives have been synthesis. Compound (1) was synthesized by the reaction of hydrazine hydrate with carbon disulphide in absolute ethanol. The compound (1) was reacted with 1, 2-dibromoethane in presence of alkali ethanol to give the compound (2). The compound (3) was formed from the reaction of compound (2) with hydrazine hydrate. Schiff base (4) was obtained by reacting of compound (3) with the compound (p-hydroxybenzaldehyde) in absolute ethanol. A variety of phenolic Schiff base (Methylolic, Etheric, and Epoxy) derivatives have been synthesized. Methylol
... Show More In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm. The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.