هناك دائما حاجة إلى طريقة فعالة لتوليد حل عددي أكثر دقة للمعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة لأن الطرق العددية لها محدودة. في هذه الدراسة ، تم حل المعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة باستخدام طريقة متعددة حدود برنولي. الهدف الرئيسي من هذه الدراسة هو ايجاد حل تقريبي لمثل هذه المشاكل في شكل متعددة الحدود في سلسلة من الخطوات المباشرة. أيضا ، تم افتراض أن مقام النواة لن يكون صفرا أبدا أو أن يكون له قيمة عقدية بسبب اختيارالعقد المحددة لمتغيري النواة الوحيدين. مع متعددات حدود برنولي من الدرجة 4 و 8 كمثال على ذلك، يوفر النهج الحالي حلا قريبا جدا من الحل الدقيق في أمثلة الاختبار. بينما. يثبت الحجم المتواضع جدا للأخطاء في أمثلة الاختبار فعالية الاستراتيجية الحالية. أيضا ، فإن السهولة التي يمكن بها تنفيذ برنامج الكمبيوتر تجعل هذه التقنية فعالة للغاية. هدف آخر هو تحديد كفاءة الطريقة المقترحة من خلال مقارنتها بأساليب مختلفة. يظهر أن الحل التقريبي للمعادلات التكاملية ذات النواة المفردة أو المفردة الضعيفة يتقارب بشدة مع الحل المضبوط للمعادلات باستخدام متعددة حدود برنولي وهو متفوق على تلك الموجودة في الأساليب الأخرى المذكورة. هذا يضمن الأصالة والدقة العالية للطريقة المقترحة. كذلك تمت مناقشة تقارب الحل. تم تنفيذ البرامج باستخدام برنامج ال MATLAB النسخة 2018a .
The fractional free volume (Fh) in polystyrene (PS) as a function of neutron -irradiation dose has been measured, using positron annihilation lifetime (PAL) method. The results show that Fh values decreased with increasing n-irradiation dose up to a total dose of 501.03× 10-2 Gy.
A percentage reduction of 2.14 in Fh values is noticed after the initial n-dose corresponding to a percentage reduction in the free volume equal to 42.14/Gy.
The total n-dose induces a percentage reduction of 7.26, corresponding to a percentage reduction of 1.45/Gy. These results indicate that cross -linking is the predominant process induced by n-irradiation.
The results suggest that n-irradiation induces structure changes in PS, causing cross-linking
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show MoreIn this work, Co-Y-oxide Nano Structure is successfully synthesized via hydrothermal method. The XRD analysis, SEM analysis, optical, electrical and photo sensing properties have been investigated for Co3O4 and Co-Y-oxide thin films. The X-ray diffraction (XRD) analysis reveals that all films are polycrystalline in nature, having cubic structure. The SEM images of thin films clearly indicates that Co3O4 possesses nanosphere like structure and flower like for Co-Y-oxide. The optical properties show that the optical energy gap follows allowed direct electronic transition calculated using Tauc equation and it increases for Co-Y-oxide. The photo sensing properties of thin films are investigated as a function of time at different wavelengths to
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Morebeef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the
... Show MoreThe researcher studied transportation problem because it's great importance in the country's economy. This paper which ware studied several ways to find a solution closely to the optimization, has applied these methods to the practical reality by taking one oil derivatives which is benzene product, where the first purpose of this study is, how we can reduce the total costs of transportation for product of petrol from warehouses in the province of Baghdad, to some stations in the Karsh district and Rusafa in the same province. Secondly, how can we address the Domandes of each station by required quantity which is depending on absorptive capacity of the warehouses (quantities supply), And through r
... Show MoreA mixture model is used to model data that come from more than one component. In recent years, it became an effective tool in drawing inferences about the complex data that we might come across in real life. Moreover, it can represent a tremendous confirmatory tool in classification observations based on similarities amongst them. In this paper, several mixture regression-based methods were conducted under the assumption that the data come from a finite number of components. A comparison of these methods has been made according to their results in estimating component parameters. Also, observation membership has been inferred and assessed for these methods. The results showed that the flexible mixture model outperformed the
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show More