In this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
The research aims to analyze and evaluate the urban land use according to the needs of the current and future population by adopting the planning criteria for the holy city of Karbala. In the theoretical side, we discussed the most important concepts of urban land use planning. In the practical aspect of the study, field surveys were conducted to obtain the required information. Using the GIS program, the land uses were planned and executed, Analysis By comparing the per capita use of urban land with criteria and the production of maps.
The main findings of the study are that there is a large deficit in meeting some of the needs of the urban land uses and the basic services of the city. The research recommended that the needs of
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreApplications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.
... Show MoreThe artificial intelligence techniques such as neural networks and fuzzy systems play an important role to disconnect flexion & expansion of the swing leg, the earth response force of the other foot has been redesigned. Under that paper, we think the fuzzy controller plan issue for yield following flawed genuine investigation of nonlinear systems. For examination, an essential fuzzy control plot has been bristly developed dependent on a current methodology delegate under the field. In this paper, the Feedforward Neural Network has been implemented with integer, fixed point and floating point data representations. Additionally, The Fuzzy Logic Controllers in both analog and digital forms has been implemented in hardware. Both designs use les
... Show MoreThe linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v
... Show MoreThe mechanical design of elevator elements is always performed by international standards. The engineer selects the appropriate elements of elevator according to catalogues without knowing scientific details. Therefore, a theoretical analysis is achieved at two operating conditions for guide rails (1) safety gear operation, and (2) running condition with the loads unevenly distributed on the elevator car. The guide rail is considered a continuous beam with variable supports. Then the British code is listed showing the equations used in it.
The theoretical equations showed that guide rails are never subjected to stress in simultaneous combined buckling and bending in the plane, where the bending moment is exerted. It is always a c
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
Israel is one of the countries most interested in Iran's nuclear program file, and the progress of negotiations between Iran and the six countries and will end it, as well as the nature of the relationship between Iran and the United States of America. Is determined by the Israeli vision of the nature of Iran's nuclear program Iran's policy toward Israel orientations, which does not recognize the existence of Israel. Israel, therefore, one of the countries pushing to prevent Iran from acquiring nuclear technology. However, those Israeli efforts did not succeed in achieving its objectives, the United States of America and European countries is well aware of the risk of stenosis on Iran, as well as the risks and the consequences of militar
... Show MorePraise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his whole family and companions, but after: God Almighty has instituted types of acts of worship and classes of obedience that, if performed by the servant, would link him with his Creator and connect with his Lord. And for the sake of these worship, and the greatest of them: the worship of i'tikaaf, for souls need rest and recuperation from the struggle of life and its concerns, concerns and anguish, and people differ in their attitudes and interests in the means of recreation, and many people consider the outing and travel the best way in which they breathe from their toil and toil, and reclaim their strength and the advised adult He fin
... Show More