An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has also been established that (ETADM) is a trustworthy technique for solving differential equations. Using the Mathematica 13.3 programme, the graphs of the approximate solutions are presented.
Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreCopper selenide (Cu2Se) thin films were prepared by thermal evaporation at RT with thickness 500 nm. The heat-treating for (400 &500) K for the absorber layer has been investigated. This research includes, studying the structural properties of X-ray diffraction (XRD) that show the Cu2Se thin film (Cubic) and has a polycrystalline orientation prevalent (220). Moreover, studying the effect of annealing on their surface morphology properties by using Atomic Force Microscopy AFM. Optical properties were considered using the transmittance and absorbance spectra had been recorded when wavelength range (400 - 1000) nm in order to study the absorption coefficient and energy gap. It was found that these films had allowed direct transitio
... Show MoreUltraviolet photodetectors have been widely utilized in several applications, such as advanced communication, ozone sensing, air purification, flame detection, etc. Gallium nitride and its compound semiconductors have been promising candidates in photodetection applications. Unlike polar gallium nitride-based optoelectronics, non-polar gallium nitride-based optoelectronics have gained huge attention due to the piezoelectric and spontaneous polarization effect–induced quantum confined-stark effect being eliminated. In turn, non-polar gallium nitride-based photodetectors portray higher efficiency and faster response compared to the polar growth direction. To date, however, a systematic literature review of non-polar gallium nitride-
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreThe aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.
Ag2O (Silver Oxide) is an important p-type (in chasm to most oxides which were n-type), with a high conductivity semiconductor. From the optical absorbance data, the energy gap value of the Ag2O thin films was 1.93 eV, where this value substantially depends on the production method, vacuum evaporation of silver, and optical properties of Ag2O thin films are also affected by the precipitation conditions. The n-type and p-type silicon substrates were used with porous silicon wafers to precipitate ±125 nm, as thick Ag2O thin film by thermal evaporation techniques in vacuum and via rapid thermal oxidation of 400oC and oxidation time 95 s, then characterized by measurement of
... Show MoreIn this note, we present a component-wise algorithm combining several recent ideas from signal processing for simultaneous piecewise constants trend, seasonality, outliers, and noise decomposition of dynamical time series. Our approach is entirely based on convex optimisation, and our decomposition is guaranteed to be a global optimiser. We demonstrate the efficiency of the approach via simulations results and real data analysis.