Some relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreMature oil reservoirs surrounded with strong edge and bottom water drive aquifers experience pressure depletion and water coning/cresting. This laboratory research investigated the effects of bottom water drive and gas breakthrough on immiscible CO2-Assisted Gravity Drainage (CO2-AGD), focusing on substantial bottom water drive. The CO2-AGD method vertically separates the injected CO2 to formulate a gas cap and Oil. Visual experimental evaluation of CO2-AGD process performance was performed using a Hele-Shaw model. Water-wet sand was used for the experiments. The gas used for injection was pure CO2, and the “oleic” phase was n-decane with a negative spreading coefficient. The aqueous phase was deionized water. To evaluate the feasibilit
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreE-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th
... Show More
From 50 stool samples collected from children with diarrhea of both sexes who visited various hospitals in Baghdad, 26 isolates of E.coli were found to belong to the phylogenetic group E. The findings revealed that the percentage of E.coli for thephylogenetic group E is (52%) , making it the dominant group among the other phylogenetic groups. The findings demonstrated that 100% of the E.coli isolates from phylogenetic group E are resistant to penicillin, and only 15% are resistant to imipenem. Multi-drug resistance (MDR) was found to be 15%, while XDR reached 85%. The results of thephylogenetic group for the remaining species of isolates in this study were group A (2/50 and by 4%), gr
... Show MoreThis book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. I
This paper is concerned with introducing an explicit expression for orthogonal Boubaker polynomial functions with some important properties. Taking advantage of the interesting properties of Boubaker polynomials, the definition of Boubaker wavelets on interval [0,1) is achieved. These basic functions are orthonormal and have compact support. Wavelets have many advantages and applications in the theoretical and applied fields, and they are applied with the orthogonal polynomials to propose a new method for treating several problems in sciences, and engineering that is wavelet method, which is computationally more attractive in the various fields. A novel property of Boubaker wavelet function derivative in terms of Boubaker wavelet themsel
... Show MoreWe dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace