The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe research aims to identify the meaning of drug addiction, which being one of the behavioral-deviation signs. It largely seems similar to alcohol-addiction. World health organization has defined drug addiction as a sporadic or chronic-state of intoxication emerges of recurrent-consumption of drugs that impact harmfully on individual and society. The second aim is to study the psychological and health implications on drugs’ users and thirdly to design a psychological-program for those who take drugs.
In the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreThe aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states, a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal , if and only if for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ, i = 1,…, ɳ and implies Ạɳ( ) Ạɳ( have been proved..
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreAn experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee