In this work, a weighted H lder function that approximates a Jacobi polynomial which solves the second order singular Sturm-Liouville equation is discussed. This is generally equivalent to the Jacobean translations and the moduli of smoothness. This paper aims to focus on improving methods of approximation and finding the upper and lower estimates for the degree of approximation in weighted H lder spaces by modifying the modulus of continuity and smoothness. Moreover, some properties for the moduli of smoothness with direct and inverse results are considered.
Background:
Multiple sclerosis is a chronic disease believed to be the result of autoimmune disorders of the central nervous system, characterised by inflammation, demyelination, and axonal transection, affecting primarily young adults. Disease modifying therapies have become widely used, and the rapid development of these drugs highlighted the need to update our knowledge on their short- and long-term safety profile.
Objective:
The study aim is to evaluate the impact of disease-modifying treatments on thyroid functions and thyroid autoantibodies with subsequent effects on the outcome of the disease.
Materials and Methods:
A retro prospective study
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
The main work of this paper is devoted to a new technique of constructing approximated solutions for linear delay differential equations using the basis functions power series functions with the aid of Weighted residual methods (collocations method, Galerkin’s method and least square method).
The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreThe national anthem is one of the most eloquent communicative discourses that the language establishes due to its deep impact on the audience and forms a broad mass base that interacts with the chanting of the national anthem. Moreover, communication is the cornerstone in building social and educational relations. From this point of view, the communicative approach studies language in the communicative context and its six important functions identified by linguist Roman Jacobson. The official UAE national anthem is considered as a model for expressing the enthusiasm of the Emirati Arab public, who is proud of their Arabism, loyalty and love of the homeland, because of the expressions that this anthem carries, urging the public to
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The study aims to design an electronic puppet educational theater by Camtasia studio and identify the effectiveness in learning some of the artistic gymnastics skills for first grade, the research curriculum is experimental by designing two equal groups, and the research sample first grade students are distributed among 4 grade, and by the pumpkin determines two divisions (15 from each) representing the experimental group and control group, the main experiment conducted for 8 weeks by two educational units per week after which the post-tests were conducted, SPSS was used to process the results, and it was found that the electronic puppet educational theater contributed by making the learning process enjoyable and interesting and meeting the
... Show MoreThis study emphasizes the infinite-boundary integro-differential equation. To examine the approximate solution of the problem, two modified optimization algorithms are proposed based on generalized Laguerre functions. In the first technique, the proposed method is applied to the original problem by approximating the solution using the truncated generalized Laguerre polynomial of the unknown function, optimizing coefficients through error minimization, and transforming the integro-differential equation into an algebraic equation. In contrast, the second approach incorporates a penalty term into the objective function to effectively enforce boundary and integral constraints. This technique reduces the original problem to a mathematical optimi
... Show More