The aim of this paper is to introduces and study the concept of CSO-compact space via the notation of simply-open sets as well as to investigate their relationship to some well known classes of topological spaces and give some of his properties.
Abstract: This paper presents the results of the structural and optical analysis of CdS thin films prepared by Spray of Pyrolysis (SP) technique. The deposited CdS films were characterized using spectrophotometer and the effect of Sulfide on the structural properties of the films was investigated through the analysis of X-ray diffraction pattern (XRD). The growth of crystal became stronger and more oriented as seen in the X-ray diffraction pattern. The studying of X-ray diffraction showed that; all the films have the hexagonal structure with lattice constants a=b=4.1358 and c=6.7156A°, the crystallite size of the CdS thin films increases and strain (ε) as well as the dislocation density (δ) decreases. Also, the optical properties of the
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreBetween October and December 2018, 27wounds and burn swab specimens were collected by laboratories at Al-Yarmook hospital, and cultured on Mannitol salt agar. the isolate was subjected to Nd: YAG laser in different power (400mJ, 500mJ, 800mJ and 900mJ). In general the laser showed effect on bacterial growth that reach to complete killing, the statistical analysis showed that there is weak correlation between laser at 400mJ with killed percentage. While in 500mJ its exhibit complete correlation with killing percentage, this correlation was decreased with increasing in power to 800mJ and 900Mj.
Bentonite is widely used in industrial applications. The present study reports the effect of adding different weights of ZnO to the Iraqi bentonite, on surface area, pore volume and real density. These surface properties were evaluated for pure and modified bentonite. The modification was made by adding different ZnO weights such as; ( 0.5%, 1%, 5%, 10% ). The effect of heat exposing for all modified clay samples at 500 ?C have been also evaluated. The results show that the addition of 0.5% ZnO leads to increase the surface area percentage about 36%, increase pore volume percentage about 5.48% and increase the real density percentage about 27.116%. When the samples exposed to 500 ?C, their surface area and pore volumes have been decreased a
... Show More
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show More