Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreIn this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.
—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreIn this work ,glass-metal apparatus was designed and manufactured which used for preparing ahigh purity uranium. The reaction is simply take place between iodine vapour and uranium metal at 500C in closed system to form uranium tetra iodide which is decomposed on hot wire at high temperature around 1100C. Also another apparatus was made from Glass and used for preparing ahigh purity of UI4 more than 99.9% purity.
This work deals with separation of the aromatic hydrocarbons benzene, toluene, and xylene (BTX) from reformate. The separation was examined using adsorption by molecular sieve zeolite 13X in a fixed bed process. The concentration of aromatic hydrocarbons in the influent and effluent streams was measured using gas chromatography. The effect of flow rate and bed length of adsorbent on the adsorption of multicomponent hydrocarbons and adsorption capacity of molecular sieve was studied. The tendency of aromatic hydrocarbons adsorption from reformate is in the order: benzene >toluene>xylenes.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More