In this paper , we study some approximation properties of the strong difference and study the relation between the strong difference and the weighted modulus of continuity
The Imam Ibn al-Mundhir is likely in Shafi'i school. He has outlined some issues and disagreed with his doctrine. And that the vocabulary on which he relied on the weighting is correct and correct and I choose which I say. One of the most likely issues is the delay of Isha prayer to the darkness. And other issues simplified in the folds of research and study.
Tillage appearance device is mechanical, electric-electronic design, getting Patent from the Central Organization for Standardization and Quality Control – Industrial Property Department - Ministry of Planning – The Republic of IRAQ under number Patent 3876 in 20 / 4 / 2014, calculates the number of clods per area by Tillage appearance device, This is done through the generation electrical impulses are sent to the controlled accurate calculates number clods required space and shows the result on the screen in order to see the tillage view per area. Three factor used in these experiment, first factor represents forward speed of tractor three levels (3.5, 4.5, and 5.5 km/h), second factor represent soil moisture content at two levels (14
... Show MoreIn this article, a numerical method integrated with statistical data simulation technique is introduced to solve a nonlinear system of ordinary differential equations with multiple random variable coefficients. The utilization of Monte Carlo simulation with central divided difference formula of finite difference (FD) method is repeated n times to simulate values of the variable coefficients as random sampling instead being limited as real values with respect to time. The mean of the n final solutions via this integrated technique, named in short as mean Monte Carlo finite difference (MMCFD) method, represents the final solution of the system. This method is proposed for the first time to calculate the numerical solution obtained fo
... Show MoreSeveral efforts have been made to study the behavior of Total Electron Content (TEC) with many types of geomagnetic storm, the purpose of this research is to study the disturbances of the ionosphere through the TEC parameter during strong, severe and great geomagnetic storms and the validity of International Reference Ionosphere IRI model during these kinds of storms. TEC data selected for years 2000-2013 (descending solar cycle 23 to ascending cycle 24), as available from koyota Japan wdc. To find out the type of geomagnetic storms the Disturbance storm time (Dst) index was selected for the years (2000-2013) from the same website. Data from UK WDC have been taken for the solar indices sunspots number (SSN), radio flux (F10.7) and ionosp
... Show MoreIn this paper, the Decomposition method was used to find approximation solutions for a system of linear Fredholm integral equations of the second kind. In this method the solution of a functional equations is considered as the sum of an infinite series usually converging to the solution, and Adomian decomposition method for solving linear and nonlinear integral equations. Finally, numerical examples are prepared to illustrate these considerations.
In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps such that is onto, satisfy one of the following conditions belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP) Then there exists an element and additive maps such that is of the form and when condition (i) is satisfied, and when condition (ii) is satisfied
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreObject detection in real time is considered as a challenging problem. However, it is very important in a wide range of applications, especially in field of multimedia. The players and ball are the most important objects in soccer game videos and detecting them is a challenging task because of many difficulties, such as shadow and illumination, ball size, ball occluded by players or merged with lines, and similar appearance of players. To overcome these problems, we present a new system to detect the players and ball in real-time by using background subtraction and Sobel detection. The results were more accurate and approximately two times faster than those using only background subtraction.