This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
ان شركات التأمين وبسبب طبيعة نشاطها التأميني تتجمع لديها أموال ضخمة عن الأقساط التي تحصلها من المؤمن لهم, ولغرض عدم ترك هذه الاموال عاطلة, فأنه يتم استثمارها في مجالات وأدوات استثمار متنوعة لتحقيق عوائد منها. هذا ولغرض تحديد وتوجيه هذه الاموال في مجال أو أداة الاستثمار المناسبة أو تحديد مدى جدوى هذه الاستثمارات, فانه يتم تقييمها, وهناك عدة نماذج رياضية لتقييم بدائل الاستثمار في شركات التأمين, إلا أنه لا
... Show MoreThe international reporting auditor witness rapidly developed over the past years, where profession began give attention to the development of auditor reporting and improve its informational report through the issuance and amendment of some relevant international auditing standards. The reality of the situation refers to the failure to inform the auditor in Iraq in many areas, including: Clearly defined management responsibility for the preparation of financial and auditor's responsibility to express an opinion on these statements and Amendment of opinion when the financial statements as a whole is free from material misstatement based on the evidence is sufficient and appropriate audit, or not to build the auditor's ability to obt
... Show MoreThe permeability is the most important parameter that indicates how efficient the reservoir fluids flow through the rock pores to the wellbore. Well-log evaluation and core measurements techniques are typically used to estimate it. In this paper, the permeability has been predicted by using classical and Flow zone indicator methods. A comparison between the two methods shows the superiority of the FZI method correlations, these correlations can be used to estimate permeability in un-cored wells with a good approximation.
ABSTRACT Background: Color changes that are detectable to human eye can affect the esthetic appearance of ceramic veneers. The purpose of this study was to evaluate and compare the effect of artificial accelerated aging on the color of ceramic veneers cemented with different resin cements. Materials and Methods: Sixty discs were prepared with 0.5 mm thickness, 30 discs made from IPS e.max press (Ivoclar Vivadent) and 30 discs were made from VITA Enamic (VITA Zahnfabrik). The discs were cemented with three resin cements: Variolink Veneer MV 0 shade (Ivoclar Vivadent), Rely X veneer Translucent shade (3M ESPE) and NX3 Nexus Clear shade (Kerr Corporation) with 0.1 mm thickness. The spectrophotometer Easyshade Advance was used to measure the co
... Show MoreAbstract
Should be the goal of Government controls, including environmental controls and safety laws to protect citizens from the harmful effects of negative secreted by human's additions and changes in the environment. and perhaps the protection aspects of the protection of citizens from the adverse effects of communications towers, including those produced by towers of health effects. The people the right to choose the nature of the physical environment, which should not be imposed on them by others. Communications towers are one of the main problems that have been
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More