The article describes the basic principles of modeling a dictionary article in the “Dictionary of the Language of Russian Folklore Lexicon epics” (M. A. Bobunova, A. T. Khrolenko). Among such principles are the principle of linguocentrism (representation of universal cognitions in strict observance of the traditions of lexicographic science), the principle of anthropocentrism (language learning as a means of human consciousness / subconsciousness), the principle of expansionism (attracting material from various knowledge bases), the principle of explanatory ("explanatory moment"), and fractal principle (synergistic potential of the presented material: nonlinearity and self-similarity; hierarchical organizati
... Show MorePan sharpening (fusion image) is the procedure of merging suitable information from two or more images into a single image. The image fusion techniques allow the combination of different information sources to improve the quality of image and increase its utility for a particular application. In this research, six pan-sharpening method have been implemented between the panchromatic and multispectral images, these methods include Ehlers, color normalize, Gram-Schmidt, local mean and variance matching, Daubechies of rank two and Symlets of rank four wavelet transform. Two images captured by two different sensors such as landsat-8 and world view-2 have been adopted to achieve the fusion purpose. Different fidelity metric like MS
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreIn this paper, we apply a new technique combined by a Sumudu transform and iterative method called the Sumudu iterative method for resolving non-linear partial differential equations to compute analytic solutions. The aim of this paper is to construct the efficacious frequent relation to resolve these problems. The suggested technique is tested on four problems. So the results of this study are debated to show how useful this method is in terms of being a powerful, accurate and fast tool with a little effort compared to other iterative methods.
The main purpose of the work is to apply a new method, so-called LTAM, which couples the Tamimi and Ansari iterative method (TAM) with the Laplace transform (LT). This method involves solving a problem of non-fatal disease spread in a society that is assumed to have a fixed size during the epidemic period. We apply the method to give an approximate analytic solution to the nonlinear system of the intended model. Moreover, the absolute error resulting from the numerical solutions and the ten iterations of LTAM approximations of the epidemic model, along with the maximum error remainder, were calculated by using MATHEMATICA® 11.3 program to illustrate the effectiveness of the method.
In this paper, we present an approximate analytical and numerical solutions for the differential equations with multiple delay using the extend differential transform method (DTM). This method is used to solve many linear and non linear problems.
This study was aimed to find and test biological methods for reducing the aggregation of plastics such as PS in the environment and study the ability of Greater Wax worms larvae (Galleria mellonella) to eat PS that similar in the its structure to beeswax .Weight loss, morphology changes ,FTIR spectroscopy and GC-mass analysis were performed which showed changes in chemical properties of the PS due to degradation. In this study the percentage of weight loss was 33% in the PS treated with G. mellonella. FTIR of PS frass showed the disappearance of aromatic cycle band that was found in the origin PS at region more than 3000 cm-1. Also The PS frass samples from wax worms larvae revealed the creation of a new O-H stretching alcohol
... Show MoreThe autocorrelation function calculations have been carried out on photon-limited computer-simulated images of binary stars that recorded through kolmogorov atmospheric turbulence. The effect of the parameters of photon limited binary star on the variation of signal to noise, signal to background ratios, number of images that processed and the magnitude of binary stars are studied and mathematic equations are given to investigate this effect. The result indicates that signal to background ratio of photon limited images of a binary star is independent of the total number of recorded photons.
In this paper, a computer simulation is implemented to generate of an optical aberration by means of Zernike polynomials. Defocus, astigmatism, coma, and spherical Zernike aberrations were simulated in a subroutine using MATLAB function and applied as a phase error in the aperture function of an imaging system. The studying demonstrated that the Point Spread Function (PSF) and Modulation Transfer Function (MTF) have been affected by these optical aberrations. Areas under MTF for different radii of the aperture of imaging system have been computed to assess the quality and efficiency of optical imaging systems. Phase conjugation of these types aberration has been utilized in order to correct a distorted wavefront. The results showed that
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More