The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
The present paper agrees with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using suitable shrinkage weight factor and region. The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator are performed .The results are presented in attached tables.
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThe effects of shot peening treatment (SPT) were studied at (10,20, and 30) minutes on the rotating bending fatigue behavior and the behavior of the alloy steel DIN 41Cr4 vibrations. The hardness test, tensile test, constant amplitude fatigue tests, and the vibration measurements were performed on samples with and without cracks at room temperature (RT), also, the fracture surface was examined and analyzed by a Scanning Electron Microscope (SEM). The results of the investigations, for example, Stress to Number of cycles to failure (S-N) curves, fatigue strength improvement factor of 5% to 10%, the decreasing percentage of maximum Fast Fourier Transform (FFT) acceleration of the shot-peened condition were compared to untr
... Show MoreThe concept of semi-essential semimodule has been studied by many researchers.
In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule is prime, then is fully prime. If every semi-essential subsemimodule of -semimodule is essential then is fully essential. Finally, a prime subsemimodule of is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule in , if , and whenever with is a prime subsemimodule in , , then . Furthermore, some res
... Show MoreThe concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en
... Show MoreIn this paper, the classical continuous triple optimal control problem (CCTOCP) for the triple nonlinear parabolic boundary value problem (TNLPBVP) with state vector constraints (SVCs) is studied. The solvability theorem for the classical continuous triple optimal control vector CCTOCV with the SVCs is stated and proved. This is done under suitable conditions. The mathematical formulation of the adjoint triple boundary value problem (ATHBVP) associated with TNLPBVP is discovered. The Fréchet derivative of the Hamiltonian" is derived. Under suitable conditions, theorems of necessary and sufficient conditions for the optimality of the TNLPBVP with the SVCs are stated and proved.
The major target of this paper is to study a confirmed class of meromorphic univalent functions . We procure several results, such as those related to coefficient estimates, distortion and growth theorem, radii of starlikeness, and convexity for this class, n additionto hadamard product, convex combination, closure theorem, integral operators, and neighborhoods.
In this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, which are useful in water quality management and decision making. The application of Water Quality Index (WQI) with ten physicochemical water quality parameters was performed to evaluate the quality of Euphrates River water for drinking usage. This was done by subjecting the water samples collected from seven stations within Al-Anbar province during the period 2004-2010 to comprehensive physicochemical analysis. The ten physicochemical parame
... Show MoreBackground : Carpal tunnel syndrome (CTS) is the most common entrapment neuropathy of upper extremities and Open carpal tunnel release is the most frequent surgical procedure and the gold standard for cases that do not respond to conservative treatment. Aims :This study is used to evaluate the functional outcome of limited palmar mini-incision of carpal tunnel release. This study aims to determine the safety and symptomatic and functional efficacy of median nerve decompression with limited incision in carpal tunnel syndrome surgery. Patients and methods:Carpal tunnel release with a 1.5-2 cm limited palmar incision was performed on 20 patients. Patients were evaluated initially at one month after treatment according to symptom severity
... Show More