The limited availability of the two-circle diffractometer to collect intensity measurements down to the monoclinic system has been extended in a novel procedure to collect intensities for the triclinic system. The procedure involves the derivation of matrix elements from graphical representation of the reciprocal lattice. Offset of the origins of the upper layers from that of the zero-layer - characteristic of triclinic system - is determined and the 3 x 3 matrix elements are evaluated accordingly. Details of crystal alignment by X-rays for the triclinic system utilizing the intensities of equivalent reflections is described
In this research, a non-thermal plasma system was designed and a non-thermal plasma needle was manufactured for argon gas operating at normal atmospheric pressure. The electrical description of this system studied by using two different values of voltages (4.9,8) kV. Where the results showed the small amount of electrical current consumed by the system of plasma needle up to several microns of amps, and the value of the electrical current increase with the increasing gas flow, as well as the results, showed that happen a breakdown voltage at (8) kV when gas flow (4 l/min) causing a slight decrease in the electrical current value.
In this paper, we define two operators of summation and summation-integral of q-type in two dimensional spaces. Firstly, we study the convergence of these operators and then we prove Voronovskaya- type asymptotic formulas for these operators.
Objective: Breast cancer is regarded as a deadly disease in women causing lots of mortalities. Early diagnosis of breast cancer with appropriate tumor biomarkers may facilitate early treatment of the disease, thus reducing the mortality rate. The purpose of the current study is to improve early diagnosis of breast by proposing a two-stage classification of breast tumor biomarkers fora sample of Iraqi women.
Methods: In this study, a two-stage classification system is proposed and tested with four machine learning classifiers. In the first stage, breast features (demographic, blood and salivary-based attributes) are classified into normal or abnormal cases, while in the second stage the abnormal breast cases are
... Show MoreA new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
This paper presents the matrix completion problem for image denoising. Three problems based on matrix norm are performing: Spectral norm minimization problem (SNP), Nuclear norm minimization problem (NNP), and Weighted nuclear norm minimization problem (WNNP). In general, images representing by a matrix this matrix contains the information of the image, some information is irrelevant or unfavorable, so to overcome this unwanted information in the image matrix, information completion is used to comperes the matrix and remove this unwanted information. The unwanted information is handled by defining {0,1}-operator under some threshold. Applying this operator on a given ma
... Show MoreGame theory problems (GTP) frequently occur in Economy, Business Studies, Sociology, Political Science, Military Activities, and so on are some of the subjects covered. To tackle the uncertainty in Games, the analysis of games in which the payoffs are represented by fuzzy numbers (FN) will benefit from fuzzy set theory (FST).
The purpose of this paper is to develop an efficient technique for solving constraint matrix games (MG) with payoff trapezoidal fuzzy numbers (TFN). The description of the new ranking method is introduced for a constrained matrix with TFN and values. Stock market forecasting has been one of the most important research areas for decades. Stock market values are volatile, non-linear, complicated and ch
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
Giardia lamblia parasite was isolated from the diarrhea samples of patients with Giardiasis dysentery and was developed in HSP media, four mice groups have been used to find in vivo efficacy of two concentrations (128,256) mg/ml of chlorophorm extracts from Cladophora glomerata algae against Giardia lamblia parasite as compared with (Flagyl) by measuring several biochemical markers as ( GPT and GOT) enzymes ,sodium ,potassium and iron concentration as well as counting the number of parasitic cysts in each mice groups. The results demonstrate that levels of GPTA GOT enzymes have been decreased in mice treated with algal extract. As for the concentration of the Sodium, Potassium and Iron increased in mice treat
... Show MoreLeap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show More