In this paper, we define the concept of soft -connected sets and soft -connected spaces by using the notion of soft -open sets in soft topological spaces. Several properties of these concepts are investigated.
In this article it is proved experimentally that the photon is a particle that has mass and constant wavelength by explaining the effect of refractive index on the wavelength and the natural mass of photon. It is very difficult to measure the mass of photon, a simple and easy process was proposed in this paper to calculate the mass length of photon in vacuum (Y) and in medium (Y*), by measuring the length of laser beam in air (Lair) and in medium (Lmed). A new method was postulated to calculate refractive index by using these relations (n = Y*/Y), and (n = Lmed / Lair) which supposed a new theory of light.
This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show MoreThe dried fruit peel of pomegranate in Punicaceae family was fractionated chromatographically on Sephadex-LH-20 column .Gallic acid (trihydroxybenzoic acid) and its related galloyl esters such as gallotannin(i.e. β-penta-O-galloyl–D-glucose) were obtained homogenously. Different concentrations of gallic acid and gallotannin were used to determine their inhibitory effect on human serum cholinesterase. The enzyme activity was measured according to the method reported by the WHO .The inhibitory effect of these compounds on the activity of human serum cholinesterase have been studied in vitro .The inhibitory effect was remarkably clear with increasing concentration of gallic acid .Whereas galloyl ester showed n
... Show MoreThis study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show MoreThe study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreThe study included a statement toxicity of some heavy metals individually and collectively and the existence of plant nutrients in the center Agirenk bluish green moss growth and Askhaddm biomass as an indicator of the study, in addition to portability moss on the accumulation of the metal
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThe Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show More