In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreIn this work, we study several features of the non-zero divisor graphs (ℵZD- graph) for the ring Zn of integer modulo n. For instance, the clique number, radius, girth, domination number, and the local clustering coefficient are determined. Furthermore, we present an algorithm that calculates the clique number and draws the non-zero divisor for the ring Zn.
The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c
... Show MoreAbstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con
... Show MoreIschemic heart disease is a major causes of heart failure. Heart failure patients have predominantly left ventricular dysfunction (systolic or diastolic dysfunction, or both). Acute heart failure is most commonly caused by reduced myocardial contractility, and increased LV stiffness. We performed echocardiography and gated SPECT with Tc99m MIBI within 263 patients and 166 normal individuals. Left ventricular end systolic volume (LVESV), left ventricular end diastolic volume (LVEDV), and left ventricular ejection fraction (LVEF) were measured. For all degrees of ischemia, there was a significant difference between ejection fraction values measured by SPECT and echo
Purpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally. Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the theoretical model experimentally. Res
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
The research aims to show the dimensions of organizational trust represented by (administrative policies opportunities for innovation and self innovation and self- realization,availability of information,prevailing organizational values) and its reiationship to achieving the strategic position of banks represented by formation of expectations,buiiding networks,learning operations As the research was applied in each of the banks (middle east)Iraqi investment,Al-Ahly Iraqi, Business Bay, Al- Mansour investment bank),the qusestionnaire was adopted as a tool to collect data and information from the sample number (138)who are in the site (department director, division ,M.division director ,division officer, unit officer)the statistica
... Show More