In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreThe aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
The figure of personality modes determines its privileged style in the use of modern and advanced technological tools in the process of changing and developing in order to keep up with that. The proses of selection and choosing administrators in the appropriate places are the most important functions of senior management because it is easy to adopt factory buildings or establishments But this is a human world as that of machines world. So it is required to have people in the process of changing those who have a time, Knowledge, skill, ability and strong administrative personal skills, those people (leaders) should to put a clear vision for the selection and application of the change efforts and to create the necessary climate and
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
Concentrated research topic in the study of key variables in the work of the inspectors general offices , which are in the application of quality management standards audit work and reduce the incidence of corruption. It highlights the importance of current research in being a serious attempt aimed at highlighting the role of the importance of standards of quality management audit work , because they represent a router and leader of the accountant or ( Sergeant ) in the performance of his work and the extent of compliance with these standards , as well as highlight the role of quality audit in reducing the incidence of corruption , of during the professional performance of Higher auditors and determine the responsibilities entrus
... Show MoreBacteriocins were partially purified by ammonium sulphate 50% concentraction, bacteriocin activity of Pediococcus acidilactici-FMAC278 was 25600 U/ml with 5.8 folds and 7.6% yeild, the activity decrease to 12800 U/ml after dialysis with 6.3 folds and 3% yield, On the other hand the bacteriocin activity of Weissella paramesenteroides-DFR6 was 12800 U/ml with 2.7 folds and 8.8% yeild, after dialysis the activity became 6400 U/ml with 5.1 fold and 3.4% yield, Chicken Sausage were made by adding 0.25, 0.5 and 1% particaly purified bacteriocin to study its effect on microorganisms and increasing shelf life of Sausage. It is found that bacterial numbers were decreased after 3 days of storage at refrigerator at 0.5% conc. While the molds decrea
... Show More