In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreForty lower premolars with single root canals prepared with ProtaperNext files to size 25, and obturated with GP/sealer using lateral compaction. Teeth divided randomly into four groups (group n=10). Protaper universal retreatment kit (PUR), D-Race desobturation files (DRD), R-Endo retreatment kit (RE) and Hedstrom (H) files (control) were used to remove GP/sealer in each group. Removal effectiveness assessed by measuring the GP /sealer remnants in the roots after sectioning them into two halves. Stereomicroscope with a digital camera used to capture digital images. Images processed by ImageJ software to measure the percentage of GP/sealer remnants surface area in total, coronal, middle and apical areas of the canal. In the coronal area,
... Show MoreIn every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe search included a comparison between two etchands for etch CR-39 nuclear track detector, by the calculation of bulk etch rate (Vb) which is one of the track etching parameters, by two measuring methods (thichness and change mass). The first type, is the solution prepared from solving NaOH in Ethanol (NaOH/Ethanol) by varied normalities under temperature(55˚C)and etching time (30 min) then comparated with the second type the solution prepared from solving NaOH in water (NaOH/Water) by varied normalities with (70˚C) and etching time (60 min) . All detectors were irradiated with (5.48 Mev) α-Particles from an 241Am source in during (10 min). The results that Vb would increase with the increase of
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe kinetics of removing cadmium from aqueous solutions was studied using a bio-electrochemical reactor with a packed bed rotating cylindrical cathode. The effect of applied voltage, initial concentration of cadmium, cathode rotation speed, and pH on the reaction rate constant (k) was studied. The results showed that the cathodic deposition occurred under the control of mass transfer for all applied voltage values used in this research. Accordingly, the relationship between logarithmic concentration gradient with time can be represented by a first-order kinetic rate equation. It was found that the rate constant (k) depends on the applied voltage, the initial cadmium concentration, the pH and the rotational speed of cathode. It
... Show More