The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which transmit the memory and hereditary effects to other terms is examined. The theoretical results is applied to a numerical example. The calculated solution has a good agreement with the exact solution.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreRation power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MorePhenol is one of the worst-damaging organic pollutants, and it produces a variety of very poisonous organic intermediates, thus it is important to find efficient ways to eliminate it. One of the promising techniques is sonoelectrochemical processing. However, the type of electrodes, removal efficiency, and process cost are the biggest challenges. The main goal of the present study is to investigate the removal of phenol by a sonoelectrochemical process with different anodes, such as graphite, stainless steel, and titanium. The best anode performance was optimized by using the Taguchi approach with an L16 orthogonal array. the degradation of phenol sonoelectrochemically was investigated with three process parameters: current de
... Show MoreThis paper investigated the treatment of textile wastewater polluted with aniline blue (AB) by electrocoagulation process using stainless steel mesh electrodes with a horizontal arrangement. The experimental design involved the application of the response surface methodology (RSM) to find the mathematical model, by adjusting the current density (4-20 mA/cm2), distance between electrodes (0.5-3 cm), salt concentration (50-600 mg/l), initial dye concentration (50-250 mg/l), pH value (2-12 ) and experimental time (5-20 min). The results showed that time is the most important parameter affecting the performance of the electrocoagulation system. Maximum removal efficiency (96 %) was obtained at a current density of 20 mA/cm2, distance be
... Show MoreThis study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s
... Show MoreMany cities suffer from the large spread of slums, especially the cities of the Middle East. The purpose of the paper is to study the reality of informal housing in Al-Barrakia and the most important problems that it suffers from. The paper also seeks to study the presence or absence of a correlation between urban safety indicators and urban containment indicators as one of the methods of developing and planning cities. This can be achieved through sustainable urban management. The slums are a source of many urban problems that threaten the security and safety of the residents and represent a focus for the concentration of crimes and drugs. The paper seeks to answer the following question: How can urban safety be improved through urban cont
... Show MoreBackground: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreWe propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test ca
... Show More