In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.
The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreIn this study the most stable isobar for some isobaric families (light and intermediate ) nuclei with mass number (A) equals to (15-30) & (101- 115) have been determined. This determination of stable nuclide can help to determine the suitable nuclide, which can be used in different fields.
Most stable isobar can be determined by two means. First: plot mass parabolas (plotting the binding energy (B.E) as a function of the atomic number (Z)) for these isobaric families, in this method most stable isobars represent the lowest point in mass parabola (the nuclide with the highest value of binding energy).
Second: calculated the atomic number for most stable isobar (ZA) value.
Our results show that
... Show MoreModified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time
... Show MoreThe shell model calculations with Cohen-Kurath (C-K) interaction were carried out to investigate form factors of elastic transverse electron scattering, and magnetic dipole-moments of odd 7,9,11Be isotopes. The effect of the exact value of center of mass correction was adopted to generate the magnetic form factors in Born approximation picture. The contribution of the higher 2p-shell configuration was included to reproduce the experimental data. A significant improvement was obtained in the present results with core-polarization (CP) effect through the effective g-factors. The occupancies percentage with respect to the valence nucleons was also calculated.
Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA i
... Show MoreThe context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man
... Show MoreIn this study, a different design of passive air Solar Chimney(SC)was tested by installing it in the south wall of insulated test room in Baghdad city. The SC was designed from vertical and inclined parts connected serially together, the vertical SC (first part) has a single pass and Thermal Energy Storage Box Collector (TESB (refined paraffin wax as Phase Change Material(PCM)-Copper Foam Matrix(CFM))), while the inclined SC was designed in single pass, double passes and double pass with TESB (semi refined paraffin wax with copper foam matrix) with selective working angle ((30o, 45o and 60o). A computational model was employed and solved by Finite Volume Method (FVM) to simulate the air i
... Show More