In this paper we offer two new subclasses of an open unit disk of r-fold symmetric bi-univalent functions. The Taylor-Maclaurin coefficients have their coefficient bounds calculated. Furthermore, for functions in , we have solved Fekete- functional issues. For the applicable classes, there are also a few particular special motivator results.
A total of 533 specimens were collected in survey of Brachyceran species from different regions of Iraq during February to November 2014 .This study was reported 16 species belonging to 13 genera and 7 families, the results showed that Dicranosepsis Duda, 1926 (Family; Sepsidae) is recorded the genus for the first time in Iraq.
In this paper, we presented new types of Mc-function by using ðœ”-open and ð‘-open sets some of them are weaker than Mc-function and some are stronger, which are ðœ”Mc-function, Mðœ”c-function, ðœ”Mðœ”c-function, ð‘Mc-function, Mð‘c-function and ð‘Mð‘c-function, also we submitted new kinds of continuous functions and compact functions and we illustrated the relationships between these types. The purpose of this paper is to expand the study of Mcfunction and to get results that we need to find the relationship with the types that have been introduced.
This study aimed at the investigation of abnormal liver and renal functions by biochemical manifestations of underlying metabolic abnormalities in relation to hyperglycemia in non-insulin-dependent diabetic patients. The study comprised 118 diabetic patients (56 males, 62 females) and 60 age-matched healthy non-diabetic controls (30 males, 30 females). All subjects were tested for serum levels of liver enzymatic indicators, which include aspartate transaminase (AST), alanine transaminase (ALT), and alkaline phosphatase (ALP), as well as non enzymatic parameters, including total bilirubin and total proteins.Also, serum levels of renal function markers, including microalbumin, creatinine, urea, and uric acid were measured.
The find
... Show MoreSeveral attempts have been made to modify the quasi-Newton condition in order to obtain rapid convergence with complete properties (symmetric and positive definite) of the inverse of Hessian matrix (second derivative of the objective function). There are many unconstrained optimization methods that do not generate positive definiteness of the inverse of Hessian matrix. One of those methods is the symmetric rank 1( H-version) update (SR1 update), where this update satisfies the quasi-Newton condition and the symmetric property of inverse of Hessian matrix, but does not preserve the positive definite property of the inverse of Hessian matrix where the initial inverse of Hessian matrix is positive definiteness. The positive definite prope
... Show MoreThe use of silicon carbide is increasing significantly in the fields of research and technology. Topological indices enable data gathering on algebraic graphs and provide a mathematical framework for analyzing the chemical structural characteristics. In this paper, well-known degree-based topological indices are used to analyze the chemical structures of silicon carbides. To evaluate the features of various chemical or non-chemical networks, a variety of topological indices are defined. In this paper, a new concept related to the degree of the graph called "bi-distance" is introduced, which is used to calculate all the additive as well as multiplicative degree-based indices for the isomer of silicon carbide, Si2
... Show MoreSome relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.
Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreCompaction curves are widely used in civil engineering especially for road constructions, embankments, etc. Obtaining the precise amount of Optimum Moisture Content (OMC) that gives the Maximum Dry Unit weight gdmax. is very important, where the desired soil strength can be achieved in addition to economic aspects.
In this paper, three peak functions were used to obtain the OMC and gdmax. through curve fitting for the values obtained from Standard Proctor Test. Another surface fitting was also used to model the Ohio’s compaction curves that represent the very large variation of compacted soil types.
The results showed very good correlation between the values obtained from some publ
... Show More