Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
This research is entitled (civil society in Islamic political thought) which is an intellectual approach with theories of governance in Islam) to be as an attempt to clarify the confusion between mandatory and governorship text basis, and the extent of the nation’s movement within the framework of guiding to translate requirements of the responding towards the civil state project through civil visions according to the Islamic perspective.
In other words, It is the relationship of man and society in one hand and with an authority with other hand , according to an attempt vision that is to emphasize that Islamic religion can manage modern society and can prove legal philosophical reason
... Show MoreThis study deals with the estimation of critical load of unidirectional polymer matrix composite plates by using experimental and finite element techniques at different fiber angles and fiber volume fraction of the composite plate.
Buckling analysis illustrated that the critical load decreases in nonlinear relationship with the increase of the fiber angle and that it increases with the increase of the fiber volume fraction.
The results show that the maximum value of the critical load is (629.54 N/m) at (q = 0°) and (Vf = 40 %) for the finite element method, while the minimum val
... Show MoreMany researchers have tackled the shear behavior of Reinforced Concrete (RC) beams by using different kinds of strengthening in the shear regions and steel fibers. In the current paper, the effect of multiple parameters, such as using one percentage of Steel Fibers (SF) with and without stirrups, without stirrups and steel fibers, on the shear behavior of RC beams, has been studied and compared by using Finite Element analysis (FE). Three-dimensional (3D) models of (RC) beams are developed and analyzed using ABAQUS commercial software. The models were validated by comparing their results with the experimental test. The total number of beams that were modeled for validation purposes was four. Extensive pa
... Show MoreСатья посвящена выделению и описанию функциональных стилей русского языка. В работе будет предствлена стилистическая характеристика заимствованной лексики, которая в некоторых случаях заменяет собственно русские слова, что может приводить к затемнению смысла высказывания, эвфемизации его, кроме того, заимствования заполняют определенные стилистические книши, образовавшиеся в связи со структурны
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show More