In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Abstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe adsorption of zirconium, on manganese dioxide from nitric
acid solutions has been studied as a function of shaking time, concentration of electrolytes, concentration of adsorbate and temperature effects (25- 90°C).
Four hours of shaking was appropriate to ensure that the
adsorption plateau was reached and the adsorption of zirconium decrease with an increase in nitric acid concentration. The limiting adsorption capacities at 3 molar nitric acid was 0.2 Zr per mole of Mn02. Working at elevated temperature was in favour
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreParties as active units in this process in order to work must have access to sources of funding in order to maintain their political presence in society and participate in the process of electoral competition, To win the election, bolstering the huge role that money has played in influencing the principle of equality among contestants in the elections. Those who own money will have a greater chance of winning the elections while less competitive opportunities for others who do not own the money or what they own does not give them the competitive ability to win elections. From this point of view, controlling political finance through legal regulation and institutional, media and popular monitoring has become an important requirement
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called