The purpose of this article is to improve and minimize noise from the signal by studying wavelet transforms and showing how to use the most effective ones for processing and analysis. As both the Discrete Wavelet Transformation method was used, we will outline some transformation techniques along with the methodology for applying them to remove noise from the signal. Proceeds based on the threshold value and the threshold functions Lifting Transformation, Wavelet Transformation, and Packet Discrete Wavelet Transformation. Using AMSE, A comparison was made between them , and the best was selected. When the aforementioned techniques were applied to actual data that was represented by each of the prices, it became evident that the lifting transformation method (LIFTINGW) and the discrete transformation method with a soft threshold function and the Sure threshold value (SURESDW) were the best. Consumer prices will be the dependent variable for the period of 2015–2020, and Iraqi oil (Average price of a barrel of Iraqi oil) will serve as the explanatory variable. The methods described above have proven effective in estimating the nonparametric regression function for the study model. Paper type: Research paper.
In this paper, the process for finding an approximate solution of nonlinear three-dimensional (3D) Volterra type integral operator equation (N3D-VIOE) in R3 is introduced. The modelling of the majorant function (MF) with the modified Newton method (MNM) is employed to convert N3D-VIOE to the linear 3D Volterra type integral operator equation (L3D-VIOE). The method of trapezoidal rule (TR) and collocation points are utilized to determine the approximate solution of L3D-VIOE by dealing with the linear form of the algebraic system. The existence of the approximate solution and its uniqueness are proved, and illustrative examples are provided to show the accuracy and efficiency of the model.
Mathematical Subject Classificat
... Show Morehis analysis aims to establish Riemann-Liouville derivation andintegral operators regarding the recently suggested seven-parameter Mittag-Leffler function then investigates the corresponding special cases. In addition,certain notable results associated with those new operators have been dis-cussed
Background: Powerlifters and bodybuilders use anabolic androgenic steroids (AAS) especially – as many as 55 percent of elite powerlifters admitted using these agents. In contrast to numerous documented toxic and hormonal effects of AAS their impact on the structure and function of the left ventricular (LV) was not yet fully understood.
The comedian scenes which Shakespeare has entered in some of his tragedies(Hamlet, King Lear, and Macbeth), constantly the wrath of conservative critics and theorists of Western Drama, as big violation to Aristotle’s rules of tragedy that is forbidden to insert comedian scene in tragedy. Chapter one deals with the research problem, and its significance, purpose,Boarders and the definition of Comic Relieve. Chapter two comprises the theoretical framework which has displayed Arist-Otle’s conception about the imitation way of heroes characters between tragedy and comedy, the different function of catharsis in each one. Then the research has exposed the economical and theatrical activities in London during Elizabethan age which was looke
... Show MoreABSTRACT
Critical buckling temperature of angle-ply laminated plate is developed using a higher-order displacement field. This displacement field used by Mantari et al based on a constant ‘‘m’’, which is determined to give results closest to the three dimensions elasticity (3-D) theory. Equations of motion based on higher-order theory angle ply plates are derived through Hamilton, s principle, and solved using Navier-type solution to obtain critical buckling temperature for simply supported laminated plates. Changing (α2/ α1) ratios, number of layers, aspect ratios, E1/E2 ratios for thick and thin plates and their effect on thermal
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
In this paper, we propose an approach to estimate the induced potential, which is generated by swift heavy ions traversing a ZnO thin film, via an energy loss function (ELF). This induced potential is related to the projectile charge density, ρq(k) and is described by the extended Drude dielectric function. At zero momentum transfer, the resulting ELF exhibits good agreement with the previously reported results. The ELF, obtained by the extended Drude model, displays a realistic behavior over the Bethe ridge. It is observed that the induced potential relies on the heavy ion velocity and charge state q. Further, the numerical results show that the induced potential for neutral H, as projectile, dominates when the heavy ion velocity is less
... Show MoreThe sunrise, sunset, and day length times for Baghdad (Latitude =33.34º N, Longitude =44.43º E) were calculated with high accuracy on a daily basis during 2019. The results showed that the earliest time of sunrise in Baghdad was at 4h: 53m from 5 Jun. to 20 Jun while the latest was at 7h: 07m from 5 Jan. to 11 Jan. The earliest time of sunset in Baghdad was at16 h: 55m from 30 Nov. to 10 Dec. whereas the latest was at 19h: 16m from 25 Jun. to 5 Jul. The minimum period of day length in Baghdad was 9h: 57m) in 17 Dec. whereas the maximum period was 14h: 22m) in 20 Jun. Day length was calculated and compared among regions of different latitudes(0, 15, 30, 45 and 60 north).
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos