Estimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using proposed method, we have conclude that the 2-D Sinusoidal signal model can be effectively used to model symmetric gray- scale texture image and The efficiency of the proposed method to estimate model parameters.
Özet
Sözlü Türk halk edebiyatı ürünleri içinde önemli yere sahip olan türlerden biri de atasözleridir. Atasözleri, nesilden nesile halk ağzında dolaşan, kimin söylediği bilinmeyen, birtakım gerçekleri kısa ve öz bir şekilde ifade eden sözlerdir. Türk atasözleri Orhun Abideleri’nde ilk kez karşımıza çıkmakla birlikte, Uygur dönemi yazıtlarında ve özellikle Dîvânü Lûgati’t Türk’te geniş yer bulmuştur. Dilin anlatım ve kullanım imkânlarını geliştiren atasözlerine, dünyanın bütün dillerinde rastlanabilir. Bunun için, söyleyişte güzel, anlatımda güçlü, kavramda önemli unsurlar içeren kalıplaşmış sözler halinde bulunurlar. Bu çalı
... Show MorePeaceful coexistence is not seen as a new topic of secretions of modern civilization, a requirement to solve the problems of our era or one of the indications of urgent immediate needs, rather, tolerance is considered basis for building a state. Therefore, we can touch on the principles and basics of tolerance in the Holy Qur’an, the speeches of the Messenger (may God bless him and grant him peace) and his hadiths, and the principle of brotherhood that he established
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
The researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreAbstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreThe Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History
- Ahmed Hashim Mohammed and Hadil Jassas Ali
University of Baghdad - College of Education for Women
Abstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level o
... Show MoreLiquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l
... Show More