Orthogonal polynomials and their moments have significant role in image processing and computer vision field. One of the polynomials is discrete Hahn polynomials (DHaPs), which are used for compression, and feature extraction. However, when the moment order becomes high, they suffer from numerical instability. This paper proposes a fast approach for computing the high orders DHaPs. This work takes advantage of the multithread for the calculation of Hahn polynomials coefficients. To take advantage of the available processing capabilities, independent calculations are divided among threads. The research provides a distribution method to achieve a more balanced processing burden among the threads. The proposed methods are tested for various values of DHaPs parameters, sizes, and different values of threads. In comparison to the unthreaded situation, the results demonstrate an improvement in the processing time which increases as the polynomial size increases, reaching its maximum of 5.8 in the case of polynomial size and order of 8000 × 8000 (matrix size). Furthermore, the trend of continuously raising the number of threads to enhance performance is inconsistent and becomes invalid at some point when the performance improvement falls below the maximum. The number of threads that achieve the highest improvement differs according to the size, being in the range of 8 to 16 threads in 1000 × 1000 matrix size, whereas at 8000 × 8000 case it ranges from 32 to 160 threads.
This research is based on the study of common praise in Mutanabbi and Ibn Hani Al-Andalusi as the main purpose in poetry poets, and balance between them;
The research was divided into two topics, presented by introductory introduction for the purpose of praise, and the concept of budget in Arab criticism, and then presented a brief overview of the lives of poets.
In the first section, I dealt with the common objectivity of the poets, such as the subject of sincerity in praise, hyperbole in the person of Mamdouh, and self-esteem when asked, in addition to the most common characteristics in t
... Show MoreBragg Reflectors consist of periodic dielectric layers having an optical path length of quarter wavelength for each layer giving them important properties and makes them suitable for optoelectronics applications. The reflectivity can be increased by increasing the number of layers of the mirror to get the required value. For example for an 8 layers Bragg mirror (two layers for each dielectric pair), the contrast of the refractive index has to be equal to 0.275 for reaching reflectivity > 99%. Doubling the number of layers results in a reflectivity of 99.99%. The high reflectivity is purely caused by multiple-interference effects. It can be analyzed by using different matrix methods such as the transfer matrix method (TMM) which is the
... Show MoreSix proposed simply supported high strength-steel fiber reinforced concrete (HS-SFRC) beams reinforced with FRP (fiber reinforced polymer) rebars were numerically tested by finite element method using ABAQUS software to investigate their behavior under the flexural failure. The beams were divided into two groups depending on their cross sectional shape. Group A consisted of four trapezoidal beams with dimensions of (height 200 mm, top width 250 mm, and bottom width 125 mm), while group B consisted of two rectangular beams with dimensions of (125 ×200) mm. All specimens have same total length of 1500 mm, and they were also considered to be made of same high strength concrete designed material with 1% volume fraction of steel fiber.
... Show More— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreThe problems of modeling the signal and dispersion properties of a second order recursive section in the integer parameter space are considered. The formulation and solution of the section synthesis problem by selective and dispersive criteria using the methods of integer nonlinear mathematical programming are given. The availability of obtaining both positive and negative frequency dispersion of a signal in a recursive section, as well as the possibility of minimizing dispersion distortions in the system, is shown.
The study aims to identify the third instar larvae of fly species (Order : Diptera) feeding on carcasses (Fishes and Rabbits). Two families (Calliphoridae and Sarcophagidae), were recorded with highest rate in Calliphoridae species. The following species had been registered in accordance with their prevalence respectively; Calliphora vicina Rob.-Desvoidy, Chrysomya albiceps (Wiedmann), Chrysomy megacephala (Fabricius), Sarcophaga sp. and Lucilia sericata (Meigen). The highest rate has been registered Calliphora vicina during February, November, December and January at rate 100%, the larvae of this fly have not been observed during July, August, September and October. The highest rate of Ch
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreIn aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show More