A gamma T_ pure sub-module also the intersection property for gamma T_pure sub-modules have been studied in this action. Different descriptions and discuss some ownership, as Γ-module Z owns the TΓ_pure intersection property if and only if (J2 ΓK ∩ J^2 ΓF)=J^2 Γ(K ∩ F) for each Γ-ideal J and for all TΓ_pure K, and F in Z Q/P is TΓ_pure sub-module in Z/P, if P in Q.
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreUnlike fault diagnosis approaches based on the direct analysis of current and voltage signals, this paper proposes a diagnosis of induction motor faults through monitoring the variations in motor's parameters when it is subjected to an open circuit or short circuit faults. These parameters include stator and rotor resistances, self-inductances, and mutual inductance. The genetic algorithm and the trust-region method are used for the estimation process. Simulation results confirm the efficiency of both the genetic algorithm and the trust-region method in estimating the motor parameters; however, better performance in terms of estimation time is obtained when the trust-region method is adopted. The results also show the po
... Show MoreThe Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
A descriptive study, which was using an assessment approach, was conducted for the
determination of the impact of rheumatoid arthritis and osteoarthritis patient’s functional disability
upon their life style. The study was carried out at the Rheumatology and outpatients clinics of ALKarama
Teaching Hospital, Baghdad Teaching Hospital AL-Kindey Teaching Hospital and Specialized
surgeries Teaching Hospital for the period of October 15th 2003 through May 13th 2004 in Baghdad
City. A purposive (non-probability) sample of (245) arthritis patients which was comprised (111)
rheumatoid arthritis patients and (134) osteoarthritis patients, was selected out of the early stated
settings. The questionnaire was comprised of
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreIn this paper a Г-ring M is presented. We will study the concept of orthogonal generalized symmetric higher bi-derivations on Г-ring. We prove that if M is a 2-torsion free semiprime Г-ring , and are orthogonal generalized symmetric higher bi-derivations associated with symmetric higher bi-derivations respectively for all n ϵN.
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.